Results 21 to 30 of about 22,784,147 (354)
Black-Box Audio Adversarial Attack Using Particle Swarm Optimization
The development of artificial neural networks and artificial intelligence has helped to address problems and improve services in various fields, such as autonomous driving, image classification, medical diagnosis, and speech recognition.
Hyunjun Mun +3 more
doaj +1 more source
On Evaluating Adversarial Robustness of Large Vision-Language Models [PDF]
Large vision-language models (VLMs) such as GPT-4 have achieved unprecedented performance in response generation, especially with visual inputs, enabling more creative and adaptable interaction than large language models such as ChatGPT.
Yunqing Zhao +6 more
semanticscholar +1 more source
G-IDS: Generative Adversarial Networks Assisted Intrusion Detection System [PDF]
The boundaries of cyber-physical systems (CPS) and the Internet of Things (IoT) are converging together day by day to introduce a common platform on hybrid systems.
Md Hasan Shahriar +3 more
semanticscholar +1 more source
There exist various attack strategies in continuous-variable quantum key distribution (CVQKD) system in practice. Due to the powerful information processing ability of neural networks, they are applied to the detection and classification of attack ...
Shimiao Li +5 more
doaj +1 more source
GANBA: Generative Adversarial Network for Biometric Anti-Spoofing
Automatic speaker verification (ASV) is a voice biometric technology whose security might be compromised by spoofing attacks. To increase the robustness against spoofing attacks, presentation attack detection (PAD) or anti-spoofing systems for detecting ...
Alejandro Gomez-Alanis +2 more
doaj +1 more source
DroidEnemy: Battling adversarial example attacks for Android malware detection
In recent years, we have witnessed a surge in mobile devices such as smartphones, tablets, smart watches, etc., most of which are based on the Android operating system. However, because these Android-based mobile devices are becoming increasingly popular,
Neha Bala +5 more
doaj +1 more source
In this work, we propose a novel defense system against adversarial examples leveraging the unique power of Generative Adversarial Networks (GANs) to generate new adversarial examples for model retraining. To do so, we develop an automated pipeline using
Shayan Taheri +3 more
doaj +1 more source
Deep learning models have been used in creating various effective image classification applications. However, they are vulnerable to adversarial attacks that seek to misguide the models into predicting incorrect classes.
Mohammed Alkhowaiter +4 more
doaj +1 more source
AdvHat: Real-World Adversarial Attack on ArcFace Face ID System [PDF]
In this paper we propose a novel easily reproducible technique to attack the best public Face ID system ArcFace in different shooting conditions. To create an attack, we print the rectangular paper sticker on a common color printer and put it on the hat.
Stepan Alekseevich Komkov +1 more
semanticscholar +1 more source
In this work, we propose ShallowDeepNet, a novel system architecture that includes a shallow and a deep neural network. The shallow neural network has the duty of data preprocessing and generating adversarial samples. The deep neural network has the duty
Shayan Taheri +2 more
doaj +1 more source

