Results 51 to 60 of about 177,286 (215)

Are Accuracy and Robustness Correlated?

open access: yes, 2016
Machine learning models are vulnerable to adversarial examples formed by applying small carefully chosen perturbations to inputs that cause unexpected classification errors.
Boult, Terrance E.   +2 more
core   +1 more source

Simple Transparent Adversarial Examples

open access: yesCoRR, 2021
There has been a rise in the use of Machine Learning as a Service (MLaaS) Vision APIs as they offer multiple services including pre-built models and algorithms, which otherwise take a huge amount of resources if built from scratch. As these APIs get deployed for high-stakes applications, it's very important that they are robust to different ...
Jaydeep Borkar, Pin-Yu Chen
openaire   +2 more sources

A Brute-Force Black-Box Method to Attack Machine Learning-Based Systems in Cybersecurity

open access: yesIEEE Access, 2020
Machine learning algorithms are widely utilized in cybersecurity. However, recent studies show that machine learning algorithms are vulnerable to adversarial examples.
Sicong Zhang, Xiaoyao Xie, Yang Xu
doaj   +1 more source

Robust Audio Adversarial Example for a Physical Attack

open access: yes, 2019
We propose a method to generate audio adversarial examples that can attack a state-of-the-art speech recognition model in the physical world. Previous work assumes that generated adversarial examples are directly fed to the recognition model, and is not ...
Sakuma, Jun, Yakura, Hiromu
core   +1 more source

Detecting Adversarial Examples

open access: yesCoRR
Deep Neural Networks (DNNs) have been shown to be vulnerable to adversarial examples. While numerous successful adversarial attacks have been proposed, defenses against these attacks remain relatively understudied. Existing defense approaches either focus on negating the effects of perturbations caused by the attacks to restore the DNNs' original ...
Furkan Mumcu, Yasin Yilmaz
openaire   +2 more sources

Adversarial Training for Free!

open access: yes, 2019
Adversarial training, in which a network is trained on adversarial examples, is one of the few defenses against adversarial attacks that withstands strong attacks.
Davis, Larry S.   +8 more
core   +1 more source

Downstream-agnostic Adversarial Examples

open access: yes2023 IEEE/CVF International Conference on Computer Vision (ICCV), 2023
This paper has been accepted by the International Conference on Computer Vision (ICCV '23, October 2--6, 2023, Paris, France)
Ziqi Zhou 0001   +6 more
openaire   +2 more sources

Maxwell’s Demon in MLP-Mixer: towards transferable adversarial attacks

open access: yesCybersecurity
Models based on MLP-Mixer architecture are becoming popular, but they still suffer from adversarial examples. Although it has been shown that MLP-Mixer is more robust to adversarial attacks compared to convolutional neural networks (CNNs), there has been
Haoran Lyu   +5 more
doaj   +1 more source

Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples

open access: yesIEEE Access, 2019
Deep Neural Networks (DNNs) have been gaining state-of-the-art achievement compared with many traditional Machine Learning (ML) models in diverse fields. However, adversarial examples challenge the further deployment and application of DNNs. Analysis has
Yixiang Wang   +5 more
doaj   +1 more source

A Novel Adversarial Example Detection Method Based on Frequency Domain Reconstruction for Image Sensors

open access: yesSensors
Convolutional neural networks (CNNs) have been extensively used in numerous remote sensing image detection tasks owing to their exceptional performance.
Shuaina Huang, Zhiyong Zhang, Bin Song
doaj   +1 more source

Home - About - Disclaimer - Privacy