Results 31 to 40 of about 172,371 (266)
Really natural adversarial examples [PDF]
AbstractThe phenomenon of Adversarial Examples has become one of the most intriguing topics associated to deep learning. The so-called adversarial attacks have the ability to fool deep neural networks with inappreciable perturbations. While the effect is striking, it has been suggested that such carefully selected injected noise does not necessarily ...
Anibal Pedraza +2 more
openaire +1 more source
Adversarial Examples for Generative Models [PDF]
We explore methods of producing adversarial examples on deep generative models such as the variational autoencoder (VAE) and the VAE-GAN. Deep learning architectures are known to be vulnerable to adversarial examples, but previous work has focused on the application of adversarial examples to classification tasks.
Kos, Jernej, Fischer, Ian, Song, Dawn
openaire +2 more sources
Boundary Adversarial Examples Against Adversarial Overfitting
Standard adversarial training approaches suffer from robust overfitting where the robust accuracy decreases when models are adversarially trained for too long. The origin of this problem is still unclear and conflicting explanations have been reported, i.e., memorization effects induced by large loss data or because of small loss data and growing ...
Hameed, Muhammad Zaid, Buesser, Beat
openaire +2 more sources
Adversarial examples in remote sensing [PDF]
This paper considers attacks against machine learning algorithms used in remote sensing applications, a domain that presents a suite of challenges that are not fully addressed by current research focused on natural image data such as ImageNet. In particular, we present a new study of adversarial examples in the context of satellite image classification
Czaja, Wojciech +4 more
openaire +2 more sources
Person re-identification across a network of cameras, with disjoint views, has been studied extensively due to its importance in wide-area video surveillance.
Yu Zheng, Yantao Lu, Senem Velipasalar
doaj +1 more source
Instance attack: an explanation-based vulnerability analysis framework against DNNs for malware detection [PDF]
Deep neural networks (DNNs) are increasingly being used in malware detection and their robustness has been widely discussed. Conventionally, the development of an adversarial example generation scheme for DNNs involves either detailed knowledge ...
Ruijin Sun +6 more
doaj +2 more sources
The internet-of-Vehicle (IoV) can facilitate seamless connectivity between connected vehicles (CV), autonomous vehicles (AV), and other IoV entities. Intrusion Detection Systems (IDSs) for IoV networks can rely on machine learning (ML) to protect the in ...
Ibrahim Aliyu +4 more
doaj +1 more source
Appears in: Advances in Neural Information Processing Systems 33 (NeurIPS 2020)
Bose, Avishek Joey +6 more
openaire +2 more sources
Adversarial Examples Detection Beyond Image Space [PDF]
To appear in ICASSP ...
Chen, Kejiang +6 more
openaire +2 more sources
Are adversarial examples inevitable?
ISBN:978-1-7138-7273 ...
Shafahi, Ali +4 more
openaire +3 more sources

