Adversarial attacks and defenses in images, graphs and text: A review
Deep neural networks (DNN) have achieved unprecedented success in numerous machine
learning tasks in various domains. However, the existence of adversarial examples raises …
learning tasks in various domains. However, the existence of adversarial examples raises …
Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …
been remarkable. Deep learning, in particular, has been extensively used to drive …
Radar: Robust ai-text detection via adversarial learning
Recent advances in large language models (LLMs) and the intensifying popularity of
ChatGPT-like applications have blurred the boundary of high-quality text generation …
ChatGPT-like applications have blurred the boundary of high-quality text generation …
Bert-attack: Adversarial attack against bert using bert
Adversarial attacks for discrete data (such as texts) have been proved significantly more
challenging than continuous data (such as images) since it is difficult to generate adversarial …
challenging than continuous data (such as images) since it is difficult to generate adversarial …
Trustworthy ai: A computational perspective
In the past few decades, artificial intelligence (AI) technology has experienced swift
developments, changing everyone's daily life and profoundly altering the course of human …
developments, changing everyone's daily life and profoundly altering the course of human …
Adversarial machine learning attacks and defense methods in the cyber security domain
In recent years, machine learning algorithms, and more specifically deep learning
algorithms, have been widely used in many fields, including cyber security. However …
algorithms, have been widely used in many fields, including cyber security. However …
Measure and improve robustness in NLP models: A survey
As NLP models achieved state-of-the-art performances over benchmarks and gained wide
applications, it has been increasingly important to ensure the safe deployment of these …
applications, it has been increasingly important to ensure the safe deployment of these …
Context-free word importance scores for attacking neural networks
N Shakeel, S Shakeel - Journal of Computational and …, 2022 - ojs.bonviewpress.com
Abstract Leave-One-Out (LOO) scores provide estimates of feature importance in neural
networks, for adversarial attacks. In this work, we present context-free word scores as a …
networks, for adversarial attacks. In this work, we present context-free word scores as a …
Adversarial machine learning in wireless communications using RF data: A review
Machine learning (ML) provides effective means to learn from spectrum data and solve
complex tasks involved in wireless communications. Supported by recent advances in …
complex tasks involved in wireless communications. Supported by recent advances in …
Frequency-guided word substitutions for detecting textual adversarial examples
Recent efforts have shown that neural text processing models are vulnerable to adversarial
examples, but the nature of these examples is poorly understood. In this work, we show that …
examples, but the nature of these examples is poorly understood. In this work, we show that …