Results 1 to 10 of about 1,173,800 (295)

GAN-Based Evasion Attack in Filtered Multicarrier Waveforms Systems

open access: yesIEEE Transactions on Machine Learning in Communications and Networking
Generative adversarial networks (GANs), a category of deep learning models, have become a cybersecurity concern for wireless communication systems. These networks enable potential attackers to deceive receivers that rely on convolutional neural networks (
Kawtar Zerhouni   +5 more
doaj   +2 more sources

Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example

open access: yesIEEE Access, 2019
Deep neural networks (DNNs) show superior performance in image and speech recognition. However, adversarial examples created by adding a little noise to an original sample can lead to misclassification by a DNN.
Hyun Kwon, Hyunsoo Yoon, Daeseon Choi
doaj   +2 more sources

On-Device Smishing Classifier Resistant to Text Evasion Attack

open access: yesIEEE Access
Smishing (SMS phishing) is a cybercrime in which criminals send fraudulent messages, including malicious links, to steal the victims’ private data or cause financial losses.
Jae Woo Seo   +6 more
doaj   +2 more sources

FP-ZOO: Fast Patch-Based Zeroth Order Optimization for Black-Box Adversarial Attacks on Vision Models [PDF]

open access: yesSensors
Deep neural networks have outperformed conventional methods in various fields such as image recognition, natural language processing, and speech recognition.
Junho Seo, Seungho Jeon
doaj   +2 more sources

Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network

open access: yesIEEE Access, 2018
Deep neural networks (DNNs) are widely used for image recognition, speech recognition, pattern analysis, and intrusion detection. Recently, the adversarial example attack, in which the input data are only slightly modified, although not an issue for ...
Hyun Kwon   +4 more
doaj   +2 more sources

MaskDGA: An Evasion Attack Against DGA Classifiers and Adversarial Defenses

open access: yesIEEE Access, 2020
Domain generation algorithms (DGAs) are commonly used by botnets to generate domain names that bots can use to establish communication channels with their command and control servers.
Lior Sidi, Asaf Nadler, Asaf Shabtai
doaj   +2 more sources

Adversarial Evasion Attacks on SVM-Based GPS Spoofing Detection Systems [PDF]

open access: yesSensors
GPS spoofing remains a critical threat in the use of autonomous vehicles. Machine-learning-based detection systems, particularly support vector machines (SVMs), demonstrate high accuracy in their defense against conventional spoofing attacks.
Sunghyeon An   +2 more
doaj   +2 more sources

Dual-Targeted adversarial example in evasion attack on graph neural networks [PDF]

open access: yesScientific Reports
This study proposes a novel approach for generating dual-targeted adversarial examples in Graph Neural Networks (GNNs), significantly advancing the field of graph-based adversarial attacks.
Hyun Kwon, Dae-Jin Kim
doaj   +2 more sources

AI Under Attack: Metric-Driven Analysis of Cybersecurity Threats in Deep Learning Models for Healthcare Applications

open access: yesAlgorithms
Incorporating Artificial Intelligence (AI) in healthcare has transformed disease diagnosis and treatment by offering unprecedented benefits. However, it has also revealed critical cybersecurity vulnerabilities in Deep Learning (DL) models, which raise ...
Sarfraz Brohi, Qurat-ul-ain Mastoi
doaj   +2 more sources

Does Physical Adversarial Example Really Matter to Autonomous Driving? Towards System-Level Effect of Adversarial Object Evasion Attack [PDF]

open access: yesIEEE International Conference on Computer Vision, 2023
In autonomous driving (AD), accurate perception is indispensable to achieving safe and secure driving. Due to its safety-criticality, the security of AD perception has been widely studied.
Ningfei Wang   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy