Explaining and Harnessing Adversarial Examples
Several machine learning models, including neural networks, consistently misclassify adversarial examples---inputs formed by applying small but intentionally worst-case perturbations to examples from the dataset, such that the perturbed input results in the model outputting an incorrect answer with high confidence.
Ian J. Goodfellow +2 more
openaire +2 more sources
DeepFake detection against adversarial examples based on D‐VAEGAN [PDF]
Ping Chen, Ming Xu, J. Qi
openalex +1 more source
Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction [PDF]
Bin Liang +5 more
openalex +1 more source
POSES: Patch Optimization Strategies for Efficiency and Stealthiness Using eXplainable AI
Adversarial examples, which are carefully crafted inputs designed to deceive deep learning models, create significant challenges in Artificial Intelligence.
Han-Ju Lee +3 more
doaj +1 more source
Adversarial Example Generation Method Based on Wavelet Transform
Adversarial examples are crucial tools for assessing the robustness of deep neural networks (DNNs) and revealing potential security vulnerabilities.
Meng Bi +5 more
doaj +1 more source
Developing Hessian–Free Second–Order Adversarial Examples for Adversarial Training
Recent studies show that deep neural networks (DNNs) are extremely vulnerable to elaborately designed adversarial examples. Adversarial training, which uses adversarial examples as training data, has been proven to be one of the most effective methods of
Qian Yaguan +5 more
doaj +1 more source
Targeted Discrepancy Attacks: Crafting Selective Adversarial Examples in Graph Neural Networks
In this study, we present a novel approach to adversarial attacks for graph neural networks (GNNs), specifically addressing the unique challenges posed by graphical data.
Hyun Kwon, Jang-Woon Baek
doaj +1 more source
Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion Reduction [PDF]
Yantao Lu +6 more
openalex +1 more source
A Bayesian-network-based cybersecurity adversarial risk analysis framework with numerical examples [PDF]
Jiali Wang, Martin Neil
openalex +1 more source
Adversarial Examples Might be Avoidable: The Role of Data Concentration in Adversarial Robustness [PDF]
Ambar Pal, Jeremias Sulam, Renè Vidal
openalex +1 more source

