Adversarial attacks and countermeasures on image classification-based deep learning models in autonomous driving systems: A systematic review

B Badjie, J Cecílio, A Casimiro - ACM Computing Surveys, 2024 - dl.acm.org
The rapid development of artificial intelligence (AI) and breakthroughs in Internet of Things
(IoT) technologies have driven the innovation of advanced autonomous driving systems …

Reinforced compressive neural architecture search for versatile adversarial robustness

D Wang, H Sapkota, Z Tao, Q Yu - … of the 30th ACM SIGKDD Conference …, 2024 - dl.acm.org
Prior research on neural architecture search (NAS) for adversarial robustness has revealed
that a lightweight and adversarially robust sub-network could exist in a non-robust large …

A tactile recognition method for rice plant lodging based on adaptive decision boundary

X Chen, P Dang, Y Chen, L Qi - Computers and Electronics in Agriculture, 2025 - Elsevier
Rice plant lodging recognition is key to improving the performance of weed control
components. However, there are several challenges that cause existing methods to have …

Hiding Faces in Plain Sight: Defending DeepFakes by Disrupting Face Detection

D Zhu, Y Li, B Wu, J Zhou, Z Wang, S Lyu - arxiv preprint arxiv …, 2024 - arxiv.org
This paper investigates the feasibility of a proactive DeepFake defense framework,{\em
FacePosion}, to prevent individuals from becoming victims of DeepFake videos by …

A Web 3.0-Based Trading Platform for Data Annotation Service With Optimal Pricing

S Yang, Y Zhang, L Cui, B Deng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Annotating data is becoming increasingly important with the prevalence of machine
learning. However, due to limited computing resources and high costs, most data owners …

Theoretical Corrections and the Leveraging of Reinforcement Learning to Enhance Triangle Attack

N Meng, C Manicke, D Chen, Y Lao, C Ding… - arxiv preprint arxiv …, 2024 - arxiv.org
Adversarial examples represent a serious issue for the application of machine learning
models in many sensitive domains. For generating adversarial examples, decision based …

Neural networks security under realistic scenario

T Maho - 2023 - theses.hal.science
Artificial Intelligence is a hot topic today, driven by the revolution of neural networks that
have shown impressive performances across various tasks. Notably, in Computer Vision …

[PDF][PDF] Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services

M Shen, C Li, Q Li, H Lu, L Zhu, K Xu - usenix.org
Abstract Deep Neural Networks (DNNs) have been proven to be vulnerable to adversarial
attacks. Existing decision-based adversarial attacks require large numbers of queries to find …

[PDF][PDF] A Survey on Image Perturbations for Model Robustness: Attacks and Defenses

PF Zhang, Z Huang - researchgate.net
The widespread adoption of deep neural networks (DNNs) has raised significant concerns
about their robustness, particularly in real-world environments characterized by inherent …