Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …
been remarkable. Deep learning, in particular, has been extensively used to drive …
Adversarial machine learning in wireless communications using RF data: A review
Machine learning (ML) provides effective means to learn from spectrum data and solve
complex tasks involved in wireless communications. Supported by recent advances in …
complex tasks involved in wireless communications. Supported by recent advances in …
Radar: Robust ai-text detection via adversarial learning
Recent advances in large language models (LLMs) and the intensifying popularity of
ChatGPT-like applications have blurred the boundary of high-quality text generation …
ChatGPT-like applications have blurred the boundary of high-quality text generation …
Bert-attack: Adversarial attack against bert using bert
Adversarial attacks for discrete data (such as texts) have been proved significantly more
challenging than continuous data (such as images) since it is difficult to generate adversarial …
challenging than continuous data (such as images) since it is difficult to generate adversarial …
Measure and improve robustness in NLP models: A survey
As NLP models achieved state-of-the-art performances over benchmarks and gained wide
applications, it has been increasingly important to ensure the safe deployment of these …
applications, it has been increasingly important to ensure the safe deployment of these …
Context-free word importance scores for attacking neural networks
N Shakeel, S Shakeel - Journal of Computational and …, 2022 - ojs.bonviewpress.com
Abstract Leave-One-Out (LOO) scores provide estimates of feature importance in neural
networks, for adversarial attacks. In this work, we present context-free word scores as a …
networks, for adversarial attacks. In this work, we present context-free word scores as a …
Frequency-guided word substitutions for detecting textual adversarial examples
Recent efforts have shown that neural text processing models are vulnerable to adversarial
examples, but the nature of these examples is poorly understood. In this work, we show that …
examples, but the nature of these examples is poorly understood. In this work, we show that …
Certified robustness to text adversarial attacks by randomized [mask]
Very recently, few certified defense methods have been developed to provably guarantee
the robustness of a text classifier to adversarial synonym substitutions. However, all the …
the robustness of a text classifier to adversarial synonym substitutions. However, all the …
Semantic robustness of models of source code
Deep neural networks are vulnerable to adversarial examples-small input perturbations that
result in incorrect predictions. We study this problem for models of source code, where we …
result in incorrect predictions. We study this problem for models of source code, where we …
Allsh: Active learning guided by local sensitivity and hardness
Active learning, which effectively collects informative unlabeled data for annotation, reduces
the demand for labeled data. In this work, we propose to retrieve unlabeled samples with a …
the demand for labeled data. In this work, we propose to retrieve unlabeled samples with a …