Adversarial attacks and defenses in machine learning-empowered communication systems and networks: A contemporary survey

Y Wang, T Sun, S Li, X Yuan, W Ni… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Adversarial attacks and defenses in machine learning and deep neural network (DNN) have
been gaining significant attention due to the rapidly growing applications of deep learning in …

Edge learning for 6G-enabled Internet of Things: A comprehensive survey of vulnerabilities, datasets, and defenses

MA Ferrag, O Friha, B Kantarci… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The deployment of the fifth-generation (5G) wireless networks in Internet of Everything (IoE)
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …

[HTML][HTML] A comprehensive survey of robust deep learning in computer vision

J Liu, Y ** - Journal of Automation and Intelligence, 2023 - Elsevier
Deep learning has presented remarkable progress in various tasks. Despite the excellent
performance, deep learning models remain not robust, especially to well-designed …

FaceQAN: Face image quality assessment through adversarial noise exploration

Ž Babnik, P Peer, V Štruc - 2022 26th International Conference …, 2022 - ieeexplore.ieee.org
Recent state-of-the-art face recognition (FR) approaches have achieved impressive
performance, yet unconstrained face recognition still represents an open problem. Face …

OMG-ATTACK: Self-Supervised On-Manifold Generation of Transferable Evasion Attacks

O Bar Tal, A Haviv, AH Bermano - Proceedings of the IEEE …, 2023 - openaccess.thecvf.com
Evasion Attacks (EA) are used to test the robustness of trained neural networks by distorting
input data to misguide the model into incorrect classifications. Creating these attacks is a …

I See Dead People: Gray-box adversarial attack on image-to-text models

R Lapid, M Sipper - Joint European Conference on Machine Learning and …, 2023 - Springer
Modern image-to-text systems typically adopt the encoder-decoder framework, which
comprises two main components: an image encoder, responsible for extracting image …

A multi-task adversarial attack against face authentication

H Wang, S Wang, C Chen, M Tistarelli… - ACM Transactions on …, 2024 - dl.acm.org
Deep learning-based identity management systems, such as face authentication systems,
are vulnerable to adversarial attacks. However, existing attacks are typically designed for …

Learn to defend: Adversarial multi-distillation for automatic modulation recognition models

Z Chen, Z Wang, D Xu, J Zhu, W Shen… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Automatic modulation recognition (AMR) of radio signal is an important research topic in the
area of non-cooperative communication and cognitive radio. Recently deep learning (DL) …

Cancelable biometric schemes for Euclidean metric and Cosine metric

Y Jiang, P Shen, L Zeng, X Zhu, D Jiang, C Chen - Cybersecurity, 2023 - Springer
The handy biometric data is a double-edged sword, paving the way of the prosperity of
biometric authentication systems but bringing the personal privacy concern. To alleviate the …

A review of generative and non-generative adversarial attack on context-rich images

H Stanly, R Paul - Engineering Applications of Artificial Intelligence, 2023 - Elsevier
In this fast-moving digital era, millions of images are added to repositories every millisecond.
These images are context-rich images with ample underlying data that are extracted and …