Results 11 to 20 of about 240,849 (326)

Adversarial Patch Attacks on Deep-Learning-Based Face Recognition Systems Using Generative Adversarial Networks

open access: yesSensors, 2023
Deep learning technology has developed rapidly in recent years and has been successfully applied in many fields, including face recognition. Face recognition is used in many scenarios nowadays, including security control systems, access control ...
Ren-Hung Hwang   +4 more
doaj   +1 more source

Black-Box Audio Adversarial Attack Using Particle Swarm Optimization

open access: yesIEEE Access, 2022
The development of artificial neural networks and artificial intelligence has helped to address problems and improve services in various fields, such as autonomous driving, image classification, medical diagnosis, and speech recognition.
Hyunjun Mun   +3 more
doaj   +1 more source

Dictionary Learning Based Scheme for Adversarial Defense in Continuous-Variable Quantum Key Distribution

open access: yesEntropy, 2023
There exist various attack strategies in continuous-variable quantum key distribution (CVQKD) system in practice. Due to the powerful information processing ability of neural networks, they are applied to the detection and classification of attack ...
Shimiao Li   +5 more
doaj   +1 more source

GANBA: Generative Adversarial Network for Biometric Anti-Spoofing

open access: yesApplied Sciences, 2022
Automatic speaker verification (ASV) is a voice biometric technology whose security might be compromised by spoofing attacks. To increase the robustness against spoofing attacks, presentation attack detection (PAD) or anti-spoofing systems for detecting ...
Alejandro Gomez-Alanis   +2 more
doaj   +1 more source

DroidEnemy: Battling adversarial example attacks for Android malware detection

open access: yesDigital Communications and Networks, 2022
In recent years, we have witnessed a surge in mobile devices such as smartphones, tablets, smart watches, etc., most of which are based on the Android operating system. However, because these Android-based mobile devices are becoming increasingly popular,
Neha Bala   +5 more
doaj   +1 more source

Does the Adversarial System Truly Deliver Justice in South Africa? A Critical Analysis [PDF]

open access: yesE-Journal of Humanities, Arts and Social Sciences
A pillar of South Africa’s legal system, the adversarial system places a strong emphasis on party-driven litigation in which competing parties argue their positions before an impartial judge.
Ntsika Qakaza
doaj   +1 more source

Adversarial-Aware Deep Learning System Based on a Secondary Classical Machine Learning Verification Approach

open access: yesSensors, 2023
Deep learning models have been used in creating various effective image classification applications. However, they are vulnerable to adversarial attacks that seek to misguide the models into predicting incorrect classes.
Mohammed Alkhowaiter   +4 more
doaj   +1 more source

RazorNet: Adversarial Training and Noise Training on a Deep Neural Network Fooled by a Shallow Neural Network

open access: yesBig Data and Cognitive Computing, 2019
In this work, we propose ShallowDeepNet, a novel system architecture that includes a shallow and a deep neural network. The shallow neural network has the duty of data preprocessing and generating adversarial samples. The deep neural network has the duty
Shayan Taheri   +2 more
doaj   +1 more source

WordRevert: Adversarial Examples Defence Method for Chinese Text Classification

open access: yesIEEE Access, 2022
Adversarial examples can evade the detection of text classification models based on Deep Neural Networks (DNNs), thus posing a potential security threat to the system.
Enhui Xu   +5 more
doaj   +1 more source

Resilient Distributed Energy Management for Systems of Interconnected Microgrids [PDF]

open access: yes, 2018
In this paper, distributed energy management of interconnected microgrids, which is stated as a dynamic economic dispatch problem, is studied. Since the distributed approach requires cooperation of all local controllers, when some of them do not comply ...
Ananduta, Wicak   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy