Advances in adversarial attacks and defenses in computer vision: A survey

N Akhtar, A Mian, N Kardan, M Shah - IEEE Access, 2021 - ieeexplore.ieee.org
Deep Learning is the most widely used tool in the contemporary field of computer vision. Its
ability to accurately solve complex problems is employed in vision research to learn deep …

Towards Risk‐Free Trustworthy Artificial Intelligence: Significance and Requirements

L Alzubaidi, A Al-Sabaawi, J Bai… - … Journal of Intelligent …, 2023 - Wiley Online Library
Given the tremendous potential and influence of artificial intelligence (AI) and algorithmic
decision‐making (DM), these systems have found wide‐ranging applications across diverse …

Anti-adversarially manipulated attributions for weakly and semi-supervised semantic segmentation

J Lee, E Kim, S Yoon - … of the IEEE/CVF conference on …, 2021 - openaccess.thecvf.com
Weakly supervised semantic segmentation produces a pixel-level localization from class
labels; but a classifier trained on such labels is likely to restrict its focus to a small …

Nesterov accelerated gradient and scale invariance for adversarial attacks

J Lin, C Song, K He, L Wang, JE Hopcroft - arxiv preprint arxiv …, 2019 - arxiv.org
Deep learning models are vulnerable to adversarial examples crafted by applying human-
imperceptible perturbations on benign inputs. However, under the black-box setting, most …

Hover-net: Simultaneous segmentation and classification of nuclei in multi-tissue histology images

S Graham, QD Vu, SEA Raza, A Azam, YW Tsang… - Medical image …, 2019 - Elsevier
Nuclear segmentation and classification within Haematoxylin & Eosin stained histology
images is a fundamental prerequisite in the digital pathology work-flow. The development of …

Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems

M Macas, C Wu, W Fuertes - Expert Systems with Applications, 2024 - Elsevier
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …

Improving transferability of adversarial examples with input diversity

C **e, Z Zhang, Y Zhou, S Bai, J Wang… - Proceedings of the …, 2019 - openaccess.thecvf.com
Though CNNs have achieved the state-of-the-art performance on various vision tasks, they
are vulnerable to adversarial examples---crafted by adding human-imperceptible …

Kornia: an open source differentiable computer vision library for pytorch

E Riba, D Mishkin, D Ponsa… - Proceedings of the …, 2020 - openaccess.thecvf.com
This work presents Kornia--an open source computer vision library which consists of a set of
differentiable routines and modules to solve generic computer vision problems. At its core …

Adversarially robust generalization requires more data

L Schmidt, S Santurkar, D Tsipras… - Advances in neural …, 2018 - proceedings.neurips.cc
Abstract Machine learning models are often susceptible to adversarial perturbations of their
inputs. Even small perturbations can cause state-of-the-art classifiers with high" standard" …

Audio adversarial examples: Targeted attacks on speech-to-text

N Carlini, D Wagner - 2018 IEEE security and privacy …, 2018 - ieeexplore.ieee.org
We construct targeted audio adversarial examples on automatic speech recognition. Given
any audio waveform, we can produce another that is over 99.9% similar, but transcribes as …