A comprehensive study on the robustness of deep learning-based image classification and object detection in remote sensing: Surveying and benchmarking
Deep neural networks (DNNs) have found widespread applications in interpreting remote
sensing (RS) imagery. However, it has been demonstrated in previous works that DNNs are …
sensing (RS) imagery. However, it has been demonstrated in previous works that DNNs are …
[HTML][HTML] Security threats to agricultural artificial intelligence: Position and perspective
In light of their remarkable predictive capabilities, artificial intelligence (AI) models driven by
deep learning (DL) have witnessed widespread adoption in the agriculture sector …
deep learning (DL) have witnessed widespread adoption in the agriculture sector …
Adversarial Attacks on Large Language Model‐Based System and Mitigating Strategies: A Case Study on ChatGPT
Machine learning algorithms are at the forefront of the development of advanced information
systems. The rapid progress in machine learning technology has enabled cutting‐edge …
systems. The rapid progress in machine learning technology has enabled cutting‐edge …
Defending backdoor attacks on vision transformer via patch processing
Abstract Vision Transformers (ViTs) have a radically different architecture with significantly
less inductive bias than Convolutional Neural Networks. Along with the improvement in …
less inductive bias than Convolutional Neural Networks. Along with the improvement in …
Data poisoning attacks in internet-of-vehicle networks: Taxonomy, state-of-the-art, and future directions
With the unprecedented development of deep learning, autonomous vehicles (AVs) have
achieved tremendous progress nowadays. However, AV supported by DNN models is …
achieved tremendous progress nowadays. However, AV supported by DNN models is …
Anti-Backdoor Model: A Novel Algorithm To Remove Backdoors in a Non-invasive Way
Recent research findings suggest that machine learning models are highly susceptible to
backdoor poisoning attacks. Backdoor poisoning attacks can be easily executed and …
backdoor poisoning attacks. Backdoor poisoning attacks can be easily executed and …
PointAPA: Towards availability poisoning attacks in 3D point clouds
Recently, the realm of deep learning applied to 3D point clouds has witnessed significant
progress, accompanied by a growing concern about the emerging security threats to point …
progress, accompanied by a growing concern about the emerging security threats to point …
DeepHardMark: Towards watermarking neural network hardware
This paper presents a framework for embedding watermarks into DNN hardware
accelerators. Unlike previous works that have looked at protecting the algorithmic …
accelerators. Unlike previous works that have looked at protecting the algorithmic …
Distributed Energy Resource Management System (DERMS) Cybersecurity Scenarios, Trends, and Potential Technologies: A Review
Critical infrastructures like the power grid are at risk from increasing cyber threats due to
high penetration of interconnected distributed energy resources (DER). Compromised DER …
high penetration of interconnected distributed energy resources (DER). Compromised DER …
Sharpness-Aware Data Poisoning Attack
Recent research has highlighted the vulnerability of Deep Neural Networks (DNNs) against
data poisoning attacks. These attacks aim to inject poisoning samples into the models' …
data poisoning attacks. These attacks aim to inject poisoning samples into the models' …