Toward the third generation artificial intelligence
There have been two competing paradigms in artificial intelligence (AI) development ever
since its birth in 1956, ie, symbolism and connectionism (or sub-symbolism). While …
since its birth in 1956, ie, symbolism and connectionism (or sub-symbolism). While …
A survey on adversarial attacks and defences
Deep learning has evolved as a strong and efficient framework that can be applied to a
broad spectrum of complex learning problems which were difficult to solve using the …
broad spectrum of complex learning problems which were difficult to solve using the …
Enhancing the transferability of adversarial attacks through variance tuning
Deep neural networks are vulnerable to adversarial examples that mislead the models with
imperceptible perturbations. Though adversarial attacks have achieved incredible success …
imperceptible perturbations. Though adversarial attacks have achieved incredible success …
Frequency domain model augmentation for adversarial attack
For black-box attacks, the gap between the substitute model and the victim model is usually
large, which manifests as a weak attack performance. Motivated by the observation that the …
large, which manifests as a weak attack performance. Motivated by the observation that the …
Improving adversarial transferability via neuron attribution-based attacks
Deep neural networks (DNNs) are known to be vulnerable to adversarial examples. It is thus
imperative to devise effective attack algorithms to identify the deficiencies of DNNs …
imperative to devise effective attack algorithms to identify the deficiencies of DNNs …
Improving adversarial robustness requires revisiting misclassified examples
Deep neural networks (DNNs) are vulnerable to adversarial examples crafted by
imperceptible perturbations. A range of defense techniques have been proposed to improve …
imperceptible perturbations. A range of defense techniques have been proposed to improve …
Adversarial training for free!
Adversarial training, in which a network is trained on adversarial examples, is one of the few
defenses against adversarial attacks that withstands strong attacks. Unfortunately, the high …
defenses against adversarial attacks that withstands strong attacks. Unfortunately, the high …
Evading defenses to transferable adversarial examples by translation-invariant attacks
Deep neural networks are vulnerable to adversarial examples, which can mislead classifiers
by adding imperceptible perturbations. An intriguing property of adversarial examples is …
by adding imperceptible perturbations. An intriguing property of adversarial examples is …
[HTML][HTML] Adversarial attacks and defenses in deep learning
With the rapid developments of artificial intelligence (AI) and deep learning (DL) techniques,
it is critical to ensure the security and robustness of the deployed algorithms. Recently, the …
it is critical to ensure the security and robustness of the deployed algorithms. Recently, the …
Feature denoising for improving adversarial robustness
Adversarial attacks to image classification systems present challenges to convolutional
networks and opportunities for understanding them. This study suggests that adversarial …
networks and opportunities for understanding them. This study suggests that adversarial …