Securing DNN for smart vehicles: An overview of adversarial attacks, defenses, and frameworks

S Almutairi, A Barnawi - Journal of Engineering and Applied Science, 2023 - Springer
Recently, many applications have begun to employ deep neural networks (DNN), such as
image recognition and safety-critical applications, for more accurate results. One of the most …

Reverse engineering of deceptions on machine-and human-centric attacks

Y Yao, X Guo, V Asnani, Y Gong, J Liu… - … and Trends® in …, 2024 - nowpublishers.com
This work presents a comprehensive exploration of Reverse Engineering of Deceptions
(RED) in the field of adversarial machine learning. It delves into the intricacies of machine …

Crafting adversarial perturbations via transformed image component swap**

A Agarwal, N Ratha, M Vatsa… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Adversarial attacks have been demonstrated to fool the deep classification networks. There
are two key characteristics of these attacks: firstly, these perturbations are mostly additive …

A random ensemble of encrypted vision transformers for adversarially robust defense

R Iijima, S Shiota, H Kiya - IEEE Access, 2024 - ieeexplore.ieee.org
Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples
(AEs). In previous studies, the use of models encrypted with a secret key was demonstrated …

Masking and purifying inputs for blocking textual adversarial attacks

H Zhang, Z Gu, H Tan, L Wang, Z Zhu, Y **e, J Li - Information Sciences, 2023 - Elsevier
The vulnerability of deep neural networks (DNNs) to adversarial attacks has attracted
attention in many fields, and researchers have sought methods to improve the robustness of …

Hindering adversarial attacks with implicit neural representations

AA Rusu, DA Calian, S Gowal… - … on Machine Learning, 2022 - proceedings.mlr.press
Abstract We introduce the Lossy Implicit Network Activation Coding (LINAC) defence, an
input transformation which successfully hinders several common adversarial attacks on …

Reverse Engineering attacks: A block-sparse optimization approach with recovery guarantees

D Thaker, P Giampouras… - … Conference on Machine …, 2022 - proceedings.mlr.press
Deep neural network-based classifiers have been shown to be vulnerable to imperceptible
perturbations to their input, such as $\ell_p $-bounded norm adversarial attacks. This has …

Dual head adversarial training

Y Jiang, X Ma, SM Erfani… - 2021 International Joint …, 2021 - ieeexplore.ieee.org
Deep neural networks (DNNs) are known to be vulnerable to adversarial examples/attacks,
raising concerns about their reliability in safety-critical applications. A number of defense …

Hindering adversarial attacks with multiple encrypted patch embeddings

AP MaungMaung, I Echizen… - 2023 Asia Pacific Signal …, 2023 - ieeexplore.ieee.org
In this paper, we propose a new key-based defense focusing on both efficiency and
robustness. Although the previous key-based defense seems effective in defending against …

[HTML][HTML] Model and Method for Providing Resilience to Resource-Constrained AI-System

V Moskalenko, V Kharchenko, S Semenov - Sensors, 2024 - mdpi.com
Artificial intelligence technologies are becoming increasingly prevalent in resource-
constrained, safety-critical embedded systems. Numerous methods exist to enhance the …