Results 41 to 50 of about 237,731 (274)
Are adversarial examples inevitable?
ISBN:978-1-7138-7273 ...
Shafahi, Ali +4 more
openaire +3 more sources
Image Classification Adversarial Example Defense Method Based on Conditional Diffusion Model [PDF]
Deep-learning models have achieved impressive results in fields such as image classification; however, they remain vulnerable to interference and threats from adversarial examples.
CHEN Zimin, GUAN Zhitao
doaj +1 more source
POSES: Patch Optimization Strategies for Efficiency and Stealthiness Using eXplainable AI
Adversarial examples, which are carefully crafted inputs designed to deceive deep learning models, create significant challenges in Artificial Intelligence.
Han-Ju Lee +3 more
doaj +1 more source
A survey of practical adversarial example attacks
Adversarial examples revealed the weakness of machine learning techniques in terms of robustness, which moreover inspired adversaries to make use of the weakness to attack systems employing machine learning.
Lu Sun, Mingtian Tan, Zhe Zhou
doaj +1 more source
Downstream-agnostic Adversarial Examples
This paper has been accepted by the International Conference on Computer Vision (ICCV '23, October 2--6, 2023, Paris, France)
Zhou, Ziqi +6 more
openaire +2 more sources
Distinguishability of adversarial examples [PDF]
Machine learning models can be easily fooled by adversarial examples which are generated from clean examples with small perturbations. This poses a critical challenge to machine learning security, and impedes the wide application of machine learning in many important domains such as computer vision and malware detection. From a unique angle, we propose
Yi Qin, Ryan Hunt, Chuan Yue
openaire +1 more source
Adversarial Attacks to Manipulate Target Localization of Object Detector
Adversarial attack has gradually become an important branch in the field of artificial intelligence security, where the potential threat brought by adversarial example attack is more not to be ignored.
Kai Xu +7 more
doaj +1 more source
Automatic Speech Recognition (ASR) systems are ubiquitous in various commercial applications. These systems typically rely on machine learning techniques for transcribing voice commands into text for further processing.
Wei Zong +4 more
doaj +1 more source
Simple Transparent Adversarial Examples
There has been a rise in the use of Machine Learning as a Service (MLaaS) Vision APIs as they offer multiple services including pre-built models and algorithms, which otherwise take a huge amount of resources if built from scratch. As these APIs get deployed for high-stakes applications, it's very important that they are robust to different ...
Borkar, Jaydeep, Chen, Pin-Yu
openaire +2 more sources
DroidEnemy: Battling adversarial example attacks for Android malware detection
In recent years, we have witnessed a surge in mobile devices such as smartphones, tablets, smart watches, etc., most of which are based on the Android operating system. However, because these Android-based mobile devices are becoming increasingly popular,
Neha Bala +5 more
doaj +1 more source

