A survey of practical adversarial example attacks
Adversarial examples revealed the weakness of machine learning techniques in terms of robustness, which moreover inspired adversaries to make use of the weakness to attack systems employing machine learning.
Lu Sun, Mingtian Tan, Zhe Zhou
doaj +1 more source
Frequency-Guided Word Substitutions for Detecting Textual Adversarial\n Examples [PDF]
Maximilian Mozes +3 more
openalex +1 more source
DiffProtect: Generate Adversarial Examples with Diffusion Models for Facial Privacy Protection [PDF]
Jiang Liu +5 more
openalex +1 more source
Invisible Perturbations: Physical Adversarial Examples Exploiting the\n Rolling Shutter Effect [PDF]
Athena Sayles +4 more
openalex +1 more source
Transferable Adversarial Examples with Bayes Approach [PDF]
Mingyuan Fan +3 more
openalex +1 more source
Weighted Average Precision: Adversarial Example Detection in the Visual Perception of Autonomous Vehicles [PDF]
Yilan Li, Senem Velipasalar
openalex +1 more source
On the Veracity of Local, Model-agnostic Explanations in Audio\n Classification: Targeted Investigations with Adversarial Examples [PDF]
Verena Praher +3 more
openalex +1 more source
Provably Robust Adversarial Examples
International Conference on Learning Representations (ICLR 2022)
Dimitar Iliev Dimitrov +3 more
openaire +4 more sources
Cross-Gen: An Efficient Generator Network for Adversarial Attacks on Cross-Modal Hashing Retrieval
Research on deep neural network (DNN)-based multi-dimensional data visualization has thoroughly explored cross-modal hash retrieval (CMHR) systems, yet their vulnerability to malicious adversarial examples remains evident.
Chao Hu +7 more
doaj +1 more source
Adversarial Examples for CNN-Based Malware Detectors
The convolutional neural network (CNN)-based models have achieved tremendous breakthroughs in many end-to-end applications, such as image identification, text classification, and speech recognition.
Bingcai Chen +4 more
doaj +1 more source

