Adversarial attacks and defenses in machine learning-empowered communication systems and networks: A contemporary survey
Adversarial attacks and defenses in machine learning and deep neural network (DNN) have
been gaining significant attention due to the rapidly growing applications of deep learning in …
been gaining significant attention due to the rapidly growing applications of deep learning in …
Edge learning for 6G-enabled Internet of Things: A comprehensive survey of vulnerabilities, datasets, and defenses
The deployment of the fifth-generation (5G) wireless networks in Internet of Everything (IoE)
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …
[HTML][HTML] A comprehensive survey of robust deep learning in computer vision
Deep learning has presented remarkable progress in various tasks. Despite the excellent
performance, deep learning models remain not robust, especially to well-designed …
performance, deep learning models remain not robust, especially to well-designed …
FaceQAN: Face image quality assessment through adversarial noise exploration
Recent state-of-the-art face recognition (FR) approaches have achieved impressive
performance, yet unconstrained face recognition still represents an open problem. Face …
performance, yet unconstrained face recognition still represents an open problem. Face …
OMG-ATTACK: Self-Supervised On-Manifold Generation of Transferable Evasion Attacks
O Bar Tal, A Haviv, AH Bermano - Proceedings of the IEEE …, 2023 - openaccess.thecvf.com
Evasion Attacks (EA) are used to test the robustness of trained neural networks by distorting
input data to misguide the model into incorrect classifications. Creating these attacks is a …
input data to misguide the model into incorrect classifications. Creating these attacks is a …
I See Dead People: Gray-box adversarial attack on image-to-text models
Modern image-to-text systems typically adopt the encoder-decoder framework, which
comprises two main components: an image encoder, responsible for extracting image …
comprises two main components: an image encoder, responsible for extracting image …
A multi-task adversarial attack against face authentication
Deep learning-based identity management systems, such as face authentication systems,
are vulnerable to adversarial attacks. However, existing attacks are typically designed for …
are vulnerable to adversarial attacks. However, existing attacks are typically designed for …
Learn to defend: Adversarial multi-distillation for automatic modulation recognition models
Z Chen, Z Wang, D Xu, J Zhu, W Shen… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Automatic modulation recognition (AMR) of radio signal is an important research topic in the
area of non-cooperative communication and cognitive radio. Recently deep learning (DL) …
area of non-cooperative communication and cognitive radio. Recently deep learning (DL) …
Cancelable biometric schemes for Euclidean metric and Cosine metric
Y Jiang, P Shen, L Zeng, X Zhu, D Jiang, C Chen - Cybersecurity, 2023 - Springer
The handy biometric data is a double-edged sword, paving the way of the prosperity of
biometric authentication systems but bringing the personal privacy concern. To alleviate the …
biometric authentication systems but bringing the personal privacy concern. To alleviate the …
A review of generative and non-generative adversarial attack on context-rich images
In this fast-moving digital era, millions of images are added to repositories every millisecond.
These images are context-rich images with ample underlying data that are extracted and …
These images are context-rich images with ample underlying data that are extracted and …