Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Securing DNN for smart vehicles: An overview of adversarial attacks, defenses, and frameworks
S Almutairi, A Barnawi - Journal of Engineering and Applied Science, 2023 - Springer
Recently, many applications have begun to employ deep neural networks (DNN), such as
image recognition and safety-critical applications, for more accurate results. One of the most …
image recognition and safety-critical applications, for more accurate results. One of the most …
Reverse engineering of deceptions on machine-and human-centric attacks
This work presents a comprehensive exploration of Reverse Engineering of Deceptions
(RED) in the field of adversarial machine learning. It delves into the intricacies of machine …
(RED) in the field of adversarial machine learning. It delves into the intricacies of machine …
Crafting adversarial perturbations via transformed image component swap**
Adversarial attacks have been demonstrated to fool the deep classification networks. There
are two key characteristics of these attacks: firstly, these perturbations are mostly additive …
are two key characteristics of these attacks: firstly, these perturbations are mostly additive …
A random ensemble of encrypted vision transformers for adversarially robust defense
Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples
(AEs). In previous studies, the use of models encrypted with a secret key was demonstrated …
(AEs). In previous studies, the use of models encrypted with a secret key was demonstrated …
Masking and purifying inputs for blocking textual adversarial attacks
The vulnerability of deep neural networks (DNNs) to adversarial attacks has attracted
attention in many fields, and researchers have sought methods to improve the robustness of …
attention in many fields, and researchers have sought methods to improve the robustness of …
Hindering adversarial attacks with implicit neural representations
Abstract We introduce the Lossy Implicit Network Activation Coding (LINAC) defence, an
input transformation which successfully hinders several common adversarial attacks on …
input transformation which successfully hinders several common adversarial attacks on …
Reverse Engineering attacks: A block-sparse optimization approach with recovery guarantees
Deep neural network-based classifiers have been shown to be vulnerable to imperceptible
perturbations to their input, such as $\ell_p $-bounded norm adversarial attacks. This has …
perturbations to their input, such as $\ell_p $-bounded norm adversarial attacks. This has …
Dual head adversarial training
Deep neural networks (DNNs) are known to be vulnerable to adversarial examples/attacks,
raising concerns about their reliability in safety-critical applications. A number of defense …
raising concerns about their reliability in safety-critical applications. A number of defense …
Hindering adversarial attacks with multiple encrypted patch embeddings
In this paper, we propose a new key-based defense focusing on both efficiency and
robustness. Although the previous key-based defense seems effective in defending against …
robustness. Although the previous key-based defense seems effective in defending against …
[HTML][HTML] Model and Method for Providing Resilience to Resource-Constrained AI-System
Artificial intelligence technologies are becoming increasingly prevalent in resource-
constrained, safety-critical embedded systems. Numerous methods exist to enhance the …
constrained, safety-critical embedded systems. Numerous methods exist to enhance the …