A comprehensive study on the robustness of deep learning-based image classification and object detection in remote sensing: Surveying and benchmarking

S Mei, J Lian, X Wang, Y Su, M Ma… - Journal of Remote …, 2024 - spj.science.org
Deep neural networks (DNNs) have found widespread applications in interpreting remote
sensing (RS) imagery. However, it has been demonstrated in previous works that DNNs are …

[HTML][HTML] Security threats to agricultural artificial intelligence: Position and perspective

Y Gao, SA Camtepe, NH Sultan, HT Bui… - … and Electronics in …, 2024 - Elsevier
In light of their remarkable predictive capabilities, artificial intelligence (AI) models driven by
deep learning (DL) have witnessed widespread adoption in the agriculture sector …

Adversarial Attacks on Large Language Model‐Based System and Mitigating Strategies: A Case Study on ChatGPT

B Liu, B **ao, X Jiang, S Cen, X He… - Security and …, 2023 - Wiley Online Library
Machine learning algorithms are at the forefront of the development of advanced information
systems. The rapid progress in machine learning technology has enabled cutting‐edge …

Defending backdoor attacks on vision transformer via patch processing

KD Doan, Y Lao, P Yang, P Li - Proceedings of the AAAI Conference on …, 2023 - ojs.aaai.org
Abstract Vision Transformers (ViTs) have a radically different architecture with significantly
less inductive bias than Convolutional Neural Networks. Along with the improvement in …

Data poisoning attacks in internet-of-vehicle networks: Taxonomy, state-of-the-art, and future directions

Y Chen, X Zhu, X Gong, X Yi, S Li - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the unprecedented development of deep learning, autonomous vehicles (AVs) have
achieved tremendous progress nowadays. However, AV supported by DNN models is …

Anti-Backdoor Model: A Novel Algorithm To Remove Backdoors in a Non-invasive Way

C Chen, H Hong, T **ang, M **e - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Recent research findings suggest that machine learning models are highly susceptible to
backdoor poisoning attacks. Backdoor poisoning attacks can be easily executed and …

PointAPA: Towards availability poisoning attacks in 3D point clouds

X Wang, M Li, P Xu, W Liu, LY Zhang, S Hu… - European Symposium on …, 2024 - Springer
Recently, the realm of deep learning applied to 3D point clouds has witnessed significant
progress, accompanied by a growing concern about the emerging security threats to point …

DeepHardMark: Towards watermarking neural network hardware

J Clements, Y Lao - Proceedings of the AAAI Conference on Artificial …, 2022 - ojs.aaai.org
This paper presents a framework for embedding watermarks into DNN hardware
accelerators. Unlike previous works that have looked at protecting the algorithmic …

Distributed Energy Resource Management System (DERMS) Cybersecurity Scenarios, Trends, and Potential Technologies: A Review

N Sugunaraj, SRA Balaji, BS Chandar… - … Surveys & Tutorials, 2025 - ieeexplore.ieee.org
Critical infrastructures like the power grid are at risk from increasing cyber threats due to
high penetration of interconnected distributed energy resources (DER). Compromised DER …

Sharpness-Aware Data Poisoning Attack

P He, H Xu, J Ren, Y Cui, H Liu, CC Aggarwal… - arxiv preprint arxiv …, 2023 - arxiv.org
Recent research has highlighted the vulnerability of Deep Neural Networks (DNNs) against
data poisoning attacks. These attacks aim to inject poisoning samples into the models' …