Results 61 to 70 of about 177,286 (215)

A Cascade Defense Method for Multidomain Adversarial Attacks under Remote Sensing Detection

open access: yesRemote Sensing, 2022
Deep neural networks have been widely used in detection tasks based on optical remote sensing images. However, in recent studies, deep neural networks have been shown to be vulnerable to adversarial examples.
Wei Xue   +4 more
doaj   +1 more source

Exploring Diverse Feature Extractions for Adversarial Audio Detection

open access: yesIEEE Access, 2023
Although deep learning models have exhibited excellent performance in various domains, recent studies have discovered that they are highly vulnerable to adversarial attacks.
Yujin Choi   +3 more
doaj   +1 more source

On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples [PDF]

open access: green, 2021
Adelin Travers   +6 more
openalex   +1 more source

On the (Un-)Avoidability of Adversarial Examples

open access: yesCoRR, 2021
The phenomenon of adversarial examples in deep learning models has caused substantial concern over their reliability. While many deep neural networks have shown impressive performance in terms of predictive accuracy, it has been shown that in many instances an imperceptible perturbation can falsely flip the network's prediction.
Sadia Chowdhury, Ruth Urner
openaire   +2 more sources

Transferability Ranking of Adversarial Examples

open access: yesCoRR, 2022
Adversarial transferability in black-box scenarios presents a unique challenge: while attackers can employ surrogate models to craft adversarial examples, they lack assurance on whether these examples will successfully compromise the target model. Until now, the prevalent method to ascertain success has been trial and error-testing crafted samples ...
Levy, Mosh   +3 more
openaire   +2 more sources

Spatially Transformed Adversarial Examples

open access: yesCoRR, 2018
Recent studies show that widely used deep neural networks (DNNs) are vulnerable to carefully crafted adversarial examples. Many advanced algorithms have been proposed to generate adversarial examples by leveraging the $\mathcal{L}_p$ distance for penalizing perturbations.
Chaowei Xiao   +5 more
openaire   +3 more sources

Adversarial Examples: Opportunities and Challenges [PDF]

open access: yesIEEE Transactions on Neural Networks and Learning Systems, 2019
16 pages, 13 figures, 5 ...
Jiliang Zhang 0002, Chen Li
openaire   +3 more sources

Attack Selectivity of Adversarial Examples in Remote Sensing Image Scene Classification

open access: yesIEEE Access, 2020
Remote sensing image (RSI) scene classification is the foundation and important technology of ground object detection, land use management and geographic analysis.
Li Chen   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy