Adversarial machine learning attacks and defense methods in the cyber security domain

I Rosenberg, A Shabtai, Y Elovici… - ACM Computing Surveys …, 2021 - dl.acm.org
In recent years, machine learning algorithms, and more specifically deep learning
algorithms, have been widely used in many fields, including cyber security. However …

Machine learning-based offline signature verification systems: A systematic review

MM Hameed, R Ahmad, MLM Kiah… - Signal Processing: Image …, 2021 - Elsevier
The offline signatures are the most widely adopted biometric authentication techniques in
banking systems, administrative and financial applications due to its simplicity and …

[HTML][HTML] Adversarial attack and defence through adversarial training and feature fusion for diabetic retinopathy recognition

S Lal, SU Rehman, JH Shah, T Meraj, HT Rauf… - Sensors, 2021 - mdpi.com
Due to the rapid growth in artificial intelligence (AI) and deep learning (DL) approaches, the
security and robustness of the deployed algorithms need to be guaranteed. The security …

Automated bank cheque verification using image processing and deep learning methods

P Agrawal, D Chaudhary, V Madaan… - Multimedia Tools and …, 2021 - Springer
Automated bank cheque verification using image processing is an attempt to complement
the present cheque truncation system, as well as to provide an alternate methodology for the …

From text to signatures: Knowledge transfer for efficient deep feature learning in offline signature verification

D Tsourounis, I Theodorakopoulos, EN Zois… - Expert Systems with …, 2022 - Elsevier
Handwritten signature is a common biometric trait, widely used for confirming the presence
or the consent of a person. Offline Signature Verification (OSV) is the task of verifying the …

Dsdtw: Local representation learning with deep soft-dtw for dynamic signature verification

J Jiang, S Lai, L **, Y Zhu - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
Dynamic time war** (DTW) is a popular technique for sequence alignment, and is the de
facto standard for dynamic signature verification. In this paper, we go a significant step …

Biometric signature authentication using machine learning techniques: Current trends, challenges and opportunities

K Bibi, S Naz, A Rehman - Multimedia Tools and Applications, 2020 - Springer
Biometric systems are playing a key role in the multitude of applications and placed at the
center of debate in the scientific research community. Among the numerous biometric …

Demystifying the transferability of adversarial attacks in computer networks

E Nowroozi, Y Mekdad… - … on Network and …, 2022 - ieeexplore.ieee.org
Convolutional Neural Networks (CNNs) models are one of the most frequently used deep
learning networks, and extensively used in both academia and industry. Recent studies …

A white-box false positive adversarial attack method on contrastive loss based offline handwritten signature verification models

Z Guo, W Li, Y Qian, O Arandjelovic… - International …, 2024 - proceedings.mlr.press
In this paper, we tackle the challenge of white-box false positive adversarial attacks on
contrastive loss based offline handwritten signature verification models. We propose a novel …

Deep representation learning: Fundamentals, technologies, applications, and open challenges

A Payandeh, KT Baghaei, P Fayyazsanavi… - IEEE …, 2023 - ieeexplore.ieee.org
Machine learning algorithms have had a profound impact on the field of computer science
over the past few decades. The performance of these algorithms heavily depends on the …