Results 41 to 50 of about 237,731 (274)

Are adversarial examples inevitable?

open access: yes, 2018
ISBN:978-1-7138-7273 ...
Shafahi, Ali   +4 more
openaire   +3 more sources

Image Classification Adversarial Example Defense Method Based on Conditional Diffusion Model [PDF]

open access: yesJisuanji gongcheng
Deep-learning models have achieved impressive results in fields such as image classification; however, they remain vulnerable to interference and threats from adversarial examples.
CHEN Zimin, GUAN Zhitao
doaj   +1 more source

POSES: Patch Optimization Strategies for Efficiency and Stealthiness Using eXplainable AI

open access: yesIEEE Access
Adversarial examples, which are carefully crafted inputs designed to deceive deep learning models, create significant challenges in Artificial Intelligence.
Han-Ju Lee   +3 more
doaj   +1 more source

A survey of practical adversarial example attacks

open access: yesCybersecurity, 2018
Adversarial examples revealed the weakness of machine learning techniques in terms of robustness, which moreover inspired adversaries to make use of the weakness to attack systems employing machine learning.
Lu Sun, Mingtian Tan, Zhe Zhou
doaj   +1 more source

Downstream-agnostic Adversarial Examples

open access: yes2023 IEEE/CVF International Conference on Computer Vision (ICCV), 2023
This paper has been accepted by the International Conference on Computer Vision (ICCV '23, October 2--6, 2023, Paris, France)
Zhou, Ziqi   +6 more
openaire   +2 more sources

Distinguishability of adversarial examples [PDF]

open access: yesProceedings of the 15th International Conference on Availability, Reliability and Security, 2020
Machine learning models can be easily fooled by adversarial examples which are generated from clean examples with small perturbations. This poses a critical challenge to machine learning security, and impedes the wide application of machine learning in many important domains such as computer vision and malware detection. From a unique angle, we propose
Yi Qin, Ryan Hunt, Chuan Yue
openaire   +1 more source

Adversarial Attacks to Manipulate Target Localization of Object Detector

open access: yesIEEE Access
Adversarial attack has gradually become an important branch in the field of artificial intelligence security, where the potential threat brought by adversarial example attack is more not to be ignored.
Kai Xu   +7 more
doaj   +1 more source

Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns

open access: yesJournal of Imaging, 2022
Automatic Speech Recognition (ASR) systems are ubiquitous in various commercial applications. These systems typically rely on machine learning techniques for transcribing voice commands into text for further processing.
Wei Zong   +4 more
doaj   +1 more source

Simple Transparent Adversarial Examples

open access: yes, 2021
There has been a rise in the use of Machine Learning as a Service (MLaaS) Vision APIs as they offer multiple services including pre-built models and algorithms, which otherwise take a huge amount of resources if built from scratch. As these APIs get deployed for high-stakes applications, it's very important that they are robust to different ...
Borkar, Jaydeep, Chen, Pin-Yu
openaire   +2 more sources

DroidEnemy: Battling adversarial example attacks for Android malware detection

open access: yesDigital Communications and Networks, 2022
In recent years, we have witnessed a surge in mobile devices such as smartphones, tablets, smart watches, etc., most of which are based on the Android operating system. However, because these Android-based mobile devices are becoming increasingly popular,
Neha Bala   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy