Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on adversarial attacks and defences
Deep learning has evolved as a strong and efficient framework that can be applied to a
broad spectrum of complex learning problems which were difficult to solve using the …
broad spectrum of complex learning problems which were difficult to solve using the …
[HTML][HTML] Review of artificial intelligence adversarial attack and defense technologies
S Qiu, Q Liu, S Zhou, C Wu - Applied Sciences, 2019 - mdpi.com
In recent years, artificial intelligence technologies have been widely used in computer
vision, natural language processing, automatic driving, and other fields. However, artificial …
vision, natural language processing, automatic driving, and other fields. However, artificial …
Privacy and security issues in deep learning: A survey
Deep Learning (DL) algorithms based on artificial neural networks have achieved
remarkable success and are being extensively applied in a variety of application domains …
remarkable success and are being extensively applied in a variety of application domains …
Threat of adversarial attacks on deep learning in computer vision: A survey
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …
computer vision, it has become the workhorse for applications ranging from self-driving cars …
Turning your weakness into a strength: Watermarking deep neural networks by backdooring
Deep Neural Networks have recently gained lots of success after enabling several
breakthroughs in notoriously challenging problems. Training these networks is …
breakthroughs in notoriously challenging problems. Training these networks is …
Adversarial example detection for DNN models: A review and experimental comparison
Deep learning (DL) has shown great success in many human-related tasks, which has led to
its adoption in many computer vision based applications, such as security surveillance …
its adoption in many computer vision based applications, such as security surveillance …
Adversarial examples for malware detection
Abstract Machine learning models are known to lack robustness against inputs crafted by an
adversary. Such adversarial examples can, for instance, be derived from regular inputs by …
adversary. Such adversarial examples can, for instance, be derived from regular inputs by …
Machine learning with a reject option: A survey
Abstract Machine learning models always make a prediction, even when it is likely to be
inaccurate. This behavior should be avoided in many decision support applications, where …
inaccurate. This behavior should be avoided in many decision support applications, where …
Adversarial machine learning applied to intrusion and malware scenarios: a systematic review
Cyber-security is the practice of protecting computing systems and networks from digital
attacks, which are a rising concern in the Information Age. With the growing pace at which …
attacks, which are a rising concern in the Information Age. With the growing pace at which …
Distortion agnostic deep watermarking
Watermarking is the process of embedding information into an image that can survive under
distortions, while requiring the encoded image to have little or no perceptual difference with …
distortions, while requiring the encoded image to have little or no perceptual difference with …