Results 91 to 100 of about 177,286 (215)
DLA: Dense-Layer-Analysis for Adversarial Example Detection [PDF]
Philip Sperl +4 more
openalex +1 more source
Adversarial Examples Are Not Bugs, They Are Features
Adversarial examples have attracted significant attention in machine learning, but the reasons for their existence and pervasiveness remain unclear. We demonstrate that adversarial examples can be directly attributed to the presence of non-robust features: features derived from patterns in the data distribution that are highly predictive, yet brittle ...
Ilyas, A +5 more
openaire +3 more sources
Deep neural networks (DNNs)-based SAR target recognition models are susceptible to adversarial examples, which significantly reduce model robustness. Current methods for generating adversarial examples for SAR imagery primarily operate in the 2-D digital
Jiahao Cui +5 more
doaj +1 more source
Research on Image Adversarial Example Generation Method Based on SE-AdvGAN [PDF]
Adversarial examples are crucial for evaluating the robustness of Deep Neural Network (DNN) and revealing their potential security risks. The adversarial example generation method based on a Generative Adversarial Network (GAN), AdvGAN, has made ...
ZHAO Hong, SONG Furong, LI Wengai
doaj +1 more source
A New Kind of Adversarial Example
Almost all adversarial attacks are formulated to add an imperceptible perturbation to an image in order to fool a model. Here, we consider the opposite which is adversarial examples that can fool a human but not a model. A large enough and perceptible perturbation is added to an image such that a model maintains its original decision, whereas a human ...
openaire +2 more sources
Robustness Certificates Against Adversarial Examples for ReLU Networks [PDF]
Sahil Singla, Soheil Feizi
openalex +1 more source
Improving the Transferability of Targeted Adversarial Examples through Object-Based Diverse Input [PDF]
Junyoung Byun +4 more
openalex +1 more source
Learning to Discriminate Adversarial Examples by Sensitivity Inconsistency in IoHT Systems. [PDF]
Zhang H +5 more
europepmc +1 more source

