Adversarial machine learning in image classification: A survey toward the defender's perspective

GR Machado, E Silva, RR Goldschmidt - ACM Computing Surveys …, 2021 - dl.acm.org
Deep Learning algorithms have achieved state-of-the-art performance for Image
Classification. For this reason, they have been used even in security-critical applications …

Machine learning and blockchain technologies for cybersecurity in connected vehicles

J Ahmad, MU Zia, IH Naqvi, JN Chattha… - … : Data Mining and …, 2024 - Wiley Online Library
Future connected and autonomous vehicles (CAVs) must be secured against cyberattacks
for their everyday functions on the road so that safety of passengers and vehicles can be …

Phantom of the adas: Securing advanced driver-assistance systems from split-second phantom attacks

B Nassi, Y Mirsky, D Nassi, R Ben-Netanel… - Proceedings of the …, 2020 - dl.acm.org
In this paper, we investigate" split-second phantom attacks," a scientific gap that causes two
commercial advanced driver-assistance systems (ADASs), Telsa Model X (HW 2.5 and HW …

Adversarial examples might be avoidable: The role of data concentration in adversarial robustness

A Pal, J Sulam, R Vidal - Advances in Neural Information …, 2024 - proceedings.neurips.cc
The susceptibility of modern machine learning classifiers to adversarial examples has
motivated theoretical results suggesting that these might be unavoidable. However, these …

A state-of-the-art review on adversarial machine learning in image classification

A Bajaj, DK Vishwakarma - Multimedia Tools and Applications, 2024 - Springer
Computer vision applications like traffic monitoring, security checks, self-driving cars,
medical imaging, etc., rely heavily on machine learning models. It raises an essential …

Defenses in adversarial machine learning: A survey

B Wu, S Wei, M Zhu, M Zheng, Z Zhu, M Zhang… - arxiv preprint arxiv …, 2023 - arxiv.org
Adversarial phenomenon has been widely observed in machine learning (ML) systems,
especially in those using deep neural networks, describing that ML systems may produce …

Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack

Y Cheng, Q Guo, F Juefei-Xu, SW Lin… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Image denoising can remove natural noise that widely exists in images captured by
multimedia devices due to low-quality imaging sensors, unstable image transmission …

Countering adversarial attacks on autonomous vehicles using denoising techniques: A review

A Kloukiniotis, A Papandreou, A Lalos… - IEEE Open Journal …, 2022 - ieeexplore.ieee.org
The evolution of automotive technology will eventually permit the automated driving system
on the vehicle to handle all circumstances. Human occupants will be just passengers. This …

AI robustness: a human-centered perspective on technological challenges and opportunities

A Tocchetti, L Corti, A Balayn, M Yurrita… - ACM Computing …, 2022 - dl.acm.org
Despite the impressive performance of Artificial Intelligence (AI) systems, their robustness
remains elusive and constitutes a key issue that impedes large-scale adoption. Besides …

Artificial Immune System of Secure Face Recognition Against Adversarial Attacks

M Ren, Y Wang, Y Zhu, Y Huang, Z Sun, Q Li… - International Journal of …, 2024 - Springer
Deep learning-based face recognition models are vulnerable to adversarial attacks. In
contrast to general noises, the presence of imperceptible adversarial noises can lead to …