[HTML][HTML] Review of artificial intelligence adversarial attack and defense technologies

S Qiu, Q Liu, S Zhou, C Wu - Applied Sciences, 2019 - mdpi.com
In recent years, artificial intelligence technologies have been widely used in computer
vision, natural language processing, automatic driving, and other fields. However, artificial …

Better safe than never: A survey on adversarial machine learning applications towards iot environment

S Alkadi, S Al-Ahmadi, MMB Ismail - Applied Sciences, 2023 - mdpi.com
Internet of Things (IoT) technologies serve as a backbone of cutting-edge intelligent
systems. Machine Learning (ML) paradigms have been adopted within IoT environments to …

[HTML][HTML] Toward data integrity architecture for cloud-based AI systems

EN Witanto, YE Oktian, SG Lee - Symmetry, 2022 - mdpi.com
AI has been implemented in many sectors such as security, health, finance, national
defense, etc. However, together with AI's groundbreaking improvement, some people exploit …

[HTML][HTML] Ask-vit: A model with improved vit robustness through incorporating sk modules using adversarial training

Y Chang, H Zhao, W Wang - Electronics, 2022 - mdpi.com
The ViTs model has been widely used since it was proposed, and its performance on large-
scale datasets has surpassed that of CNN models. In order to deploy the ViTs model safely …

[HTML][HTML] A cascade defense method for multidomain adversarial attacks under remote sensing detection

W Xue, Z Chen, W Tian, Y Wu, B Hua - Remote Sensing, 2022 - mdpi.com
Deep neural networks have been widely used in detection tasks based on optical remote
sensing images. However, in recent studies, deep neural networks have been shown to be …

Preprocessing pipelines including block-matching convolutional neural network for image denoising to robustify deep reidentification against evasion attacks

M Pawlicki, RS Choraś - Entropy, 2021 - mdpi.com
Artificial neural networks have become the go-to solution for computer vision tasks, including
problems of the security domain. One such example comes in the form of reidentification …

Using High-Level Representation Difference Constraint and Relative Reconstruction Constraint for Defending against Adversarial Attacks

S Gao, X Wang, Y Dong, S Yao - Electronics, 2023 - mdpi.com
Adversarial examples in which imperceptible perturbations to the input can easily subvert a
well-trained model's prediction pose huge potential security threats to deep neural networks …

[HTML][HTML] A new method for countering evasion adversarial attacks on information systems based on artificial intelligence

AA Vorobeva, MA Matuzko, DI Sivkov… - … , механики и оптики, 2024 - cyberleninka.ru
Modern artificial intelligence (AI) technologies are being used in a variety of fields, from
science to everyday life. However, the widespread use of AI-based systems has highlighted …

Новый метод противодействия состязательным атакам уклонения на информационные системы, основанные на искусственном интеллекте

АА Воробьева, М М А, С Д И… - … , механики и оптики, 2024 - ntv.elpub.ru
Аннотация Введение. Современные технологии искусственного интеллекта находят
применение в различных областях науки и повседневной жизни. Повсеместное …

A new method for countering evasion adversarial attacks on information systems based on artificial intelligence

A Vorobeva Alisa, A Matuzko Maxim… - Journal Scientific and …, 2024 - ntv.ifmo.ru
Modern artificial intelligence (AI) technologies are being used in a variety of fields, from
science to everyday life. However, the widespread use of AI-based systems has highlighted …