Results 31 to 40 of about 172,371 (266)

Really natural adversarial examples [PDF]

open access: yesInternational Journal of Machine Learning and Cybernetics, 2021
AbstractThe phenomenon of Adversarial Examples has become one of the most intriguing topics associated to deep learning. The so-called adversarial attacks have the ability to fool deep neural networks with inappreciable perturbations. While the effect is striking, it has been suggested that such carefully selected injected noise does not necessarily ...
Anibal Pedraza   +2 more
openaire   +1 more source

Adversarial Examples for Generative Models [PDF]

open access: yes2018 IEEE Security and Privacy Workshops (SPW), 2018
We explore methods of producing adversarial examples on deep generative models such as the variational autoencoder (VAE) and the VAE-GAN. Deep learning architectures are known to be vulnerable to adversarial examples, but previous work has focused on the application of adversarial examples to classification tasks.
Kos, Jernej, Fischer, Ian, Song, Dawn
openaire   +2 more sources

Boundary Adversarial Examples Against Adversarial Overfitting

open access: yes, 2022
Standard adversarial training approaches suffer from robust overfitting where the robust accuracy decreases when models are adversarially trained for too long. The origin of this problem is still unclear and conflicting explanations have been reported, i.e., memorization effects induced by large loss data or because of small loss data and growing ...
Hameed, Muhammad Zaid, Buesser, Beat
openaire   +2 more sources

Adversarial examples in remote sensing [PDF]

open access: yesProceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2018
This paper considers attacks against machine learning algorithms used in remote sensing applications, a domain that presents a suite of challenges that are not fully addressed by current research focused on natural image data such as ImageNet. In particular, we present a new study of adversarial examples in the context of satellite image classification
Czaja, Wojciech   +4 more
openaire   +2 more sources

An Effective Adversarial Attack on Person Re-Identification in Video Surveillance via Dispersion Reduction

open access: yesIEEE Access, 2020
Person re-identification across a network of cameras, with disjoint views, has been studied extensively due to its importance in wide-area video surveillance.
Yu Zheng, Yantao Lu, Senem Velipasalar
doaj   +1 more source

Instance attack: an explanation-based vulnerability analysis framework against DNNs for malware detection [PDF]

open access: yesPeerJ Computer Science, 2023
Deep neural networks (DNNs) are increasingly being used in malware detection and their robustness has been widely discussed. Conventionally, the development of an adversarial example generation scheme for DNNs involves either detailed knowledge ...
Ruijin Sun   +6 more
doaj   +2 more sources

Statistical Detection of Adversarial Examples in Blockchain-Based Federated Forest In-Vehicle Network Intrusion Detection Systems

open access: yesIEEE Access, 2022
The internet-of-Vehicle (IoV) can facilitate seamless connectivity between connected vehicles (CV), autonomous vehicles (AV), and other IoV entities. Intrusion Detection Systems (IDSs) for IoV networks can rely on machine learning (ML) to protect the in ...
Ibrahim Aliyu   +4 more
doaj   +1 more source

Adversarial Example Games

open access: yes, 2020
Appears in: Advances in Neural Information Processing Systems 33 (NeurIPS 2020)
Bose, Avishek Joey   +6 more
openaire   +2 more sources

Adversarial Examples Detection Beyond Image Space [PDF]

open access: yesICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2021
To appear in ICASSP ...
Chen, Kejiang   +6 more
openaire   +2 more sources

Are adversarial examples inevitable?

open access: yes, 2018
ISBN:978-1-7138-7273 ...
Shafahi, Ali   +4 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy