Results 191 to 200 of about 177,286 (215)
Some of the next articles are maybe not open access.
On The Generation of Unrestricted Adversarial Examples
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), 2020Adversarial examples are inputs designed by an adversary with the goal of fooling the machine learning models. Most of the research about adversarial examples have focused on perturbing the natural inputs with the assumption that the true label remains unchanged.
Mehrgan Khoshpasand +1 more
openaire +1 more source
On the Salience of Adversarial Examples
2019Adversarial examples are beginning to evolve as rapidly as the deep learning models they are designed to attack. These intentionally-manipulated inputs attempt to mislead the targeted model while maintaining the appearance of innocuous input data. Countermeasures against these attacks that take a global approach tend to be lossy to the original data ...
openaire +1 more source
Adversarial Examples for Malware Detection
2017Machine learning models are known to lack robustness against inputs crafted by an adversary. Such adversarial examples can, for instance, be derived from regular inputs by introducing minor—yet carefully selected—perturbations.
Kathrin Grosse +4 more
openaire +1 more source
Advops: Decoupling Adversarial Examples
Pattern Recognition, 2023Donghua Wang +3 more
openaire +1 more source
Learning defense transformations for counterattacking adversarial examples
Neural Networks, 2023Jincheng Li +2 more
exaly
Self-Recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks
IEEE Transactions on Circuits and Systems for Video Technology, 2023Jiawei Zhang, Jinwei Wang, Hao Wang
exaly
Adversarial Examples with Specular Highlights
2023 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW), 2023Vanshika Vats, Koteswar Rao Jerripothula
openaire +1 more source
EnsembleFool: A method to generate adversarial examples based on model fusion strategy
Computers and Security, 2021Wenyu Peng, Renyang Liu, Ruxin Wang
exaly

