Results 11 to 20 of about 177,286 (215)

Natural Adversarial Examples [PDF]

open access: yes2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021
We introduce two challenging datasets that reliably cause machine learning model performance to substantially degrade. The datasets are collected with a simple adversarial filtration technique to create datasets with limited spurious cues. Our datasets' real-world, unmodified examples transfer to various unseen models reliably, demonstrating that ...
Dan Hendrycks   +4 more
openaire   +2 more sources

Survey of Image Adversarial Example Defense Techniques [PDF]

open access: yesJisuanji kexue yu tansuo, 2023
The rapid and extensive growth of artificial intelligence introduces new security challenges. The generation and defense of adversarial examples for deep neural networks is one of the hot spots.
LIU Ruiqi, LI Hu, WANG Dongxia, ZHAO Chongyang, LI Boyu
doaj   +1 more source

Fooling Examples: Another Intriguing Property of Neural Networks

open access: yesSensors, 2023
Neural networks have been proven to be vulnerable to adversarial examples; these are examples that can be recognized by both humans and neural networks, although neural networks give incorrect predictions.
Ming Zhang, Yongkang Chen, Cheng Qian
doaj   +1 more source

Distinguishability of adversarial examples [PDF]

open access: yesProceedings of the 15th International Conference on Availability, Reliability and Security, 2020
Machine learning models can be easily fooled by adversarial examples which are generated from clean examples with small perturbations. This poses a critical challenge to machine learning security, and impedes the wide application of machine learning in many important domains such as computer vision and malware detection. From a unique angle, we propose
Yi Qin, Ryan Hunt, Chuan Yue
openaire   +1 more source

Verifying the Causes of Adversarial Examples [PDF]

open access: yes2020 25th International Conference on Pattern Recognition (ICPR), 2021
The robustness of neural networks is challenged by adversarial examples that contain almost imperceptible perturbations to inputs, which mislead a classifier to incorrect outputs in high confidence. Limited by the extreme difficulty in examining a high-dimensional image space thoroughly, research on explaining and justifying the causes of adversarial ...
Li, H   +4 more
openaire   +3 more sources

Efficient Adversarial Training With Transferable Adversarial Examples [PDF]

open access: yes2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2020
Adversarial training is an effective defense method to protect classification models against adversarial attacks. However, one limitation of this approach is that it can require orders of magnitude additional training time due to high cost of generating strong adversarial examples during training.
Haizhong Zheng   +4 more
openaire   +2 more sources

Adversarial Examples Generation Method Based on Image Color Random Transformation [PDF]

open access: yesJisuanji kexue, 2023
Although deep neural networks(DNNs) have good performance in most classification tasks,they are vulnerable to adversarial examples,making the security of DNNs questionable.Research designs to generate strongly aggressive adversarial examples can help ...
BAI Zhixu, WANG Hengjun, GUO Kexiang
doaj   +1 more source

Semantic Adversarial Examples [PDF]

open access: yes2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2018
Deep neural networks are known to be vulnerable to adversarial examples, i.e., images that are maliciously perturbed to fool the model. Generating adversarial examples has been mostly limited to finding small perturbations that maximize the model prediction error.
Hossein Hosseini, Radha Poovendran
openaire   +2 more sources

A Robust Adversarial Example Attack Based on Video Augmentation

open access: yesApplied Sciences, 2023
Despite the success of learning-based systems, recent studies have highlighted video adversarial examples as a ubiquitous threat to state-of-the-art video classification systems.
Mingyong Yin   +3 more
doaj   +1 more source

Adversarial examples for models of code [PDF]

open access: yesProceedings of the ACM on Programming Languages, 2020
Neural models of code have shown impressive results when performing tasks such as predicting method names and identifying certain kinds of bugs. We show that these models are vulnerable to adversarial examples , and introduce a novel approach for attacking trained models of code using ...
Noam Yefet, Uri Alon 0002, Eran Yahav
openaire   +2 more sources

Home - About - Disclaimer - Privacy