Results 81 to 90 of about 177,286 (215)

A survey of practical adversarial example attacks

open access: yesCybersecurity, 2018
Adversarial examples revealed the weakness of machine learning techniques in terms of robustness, which moreover inspired adversaries to make use of the weakness to attack systems employing machine learning.
Lu Sun, Mingtian Tan, Zhe Zhou
doaj   +1 more source

Frequency-Guided Word Substitutions for Detecting Textual Adversarial\n Examples [PDF]

open access: green, 2020
Maximilian Mozes   +3 more
openalex   +1 more source

DiffProtect: Generate Adversarial Examples with Diffusion Models for Facial Privacy Protection [PDF]

open access: green, 2023
Jiang Liu   +5 more
openalex   +1 more source

Invisible Perturbations: Physical Adversarial Examples Exploiting the\n Rolling Shutter Effect [PDF]

open access: green, 2020
Athena Sayles   +4 more
openalex   +1 more source

Transferable Adversarial Examples with Bayes Approach [PDF]

open access: green, 2022
Mingyuan Fan   +3 more
openalex   +1 more source

Provably Robust Adversarial Examples

open access: yes, 2020
International Conference on Learning Representations (ICLR 2022)
Dimitar Iliev Dimitrov   +3 more
openaire   +4 more sources

Cross-Gen: An Efficient Generator Network for Adversarial Attacks on Cross-Modal Hashing Retrieval

open access: yesFuture Internet
Research on deep neural network (DNN)-based multi-dimensional data visualization has thoroughly explored cross-modal hash retrieval (CMHR) systems, yet their vulnerability to malicious adversarial examples remains evident.
Chao Hu   +7 more
doaj   +1 more source

Adversarial Examples for CNN-Based Malware Detectors

open access: yesIEEE Access, 2019
The convolutional neural network (CNN)-based models have achieved tremendous breakthroughs in many end-to-end applications, such as image identification, text classification, and speech recognition.
Bingcai Chen   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy