A survey on adversarial attacks and defences

A Chakraborty, M Alam, V Dey… - CAAI Transactions …, 2021 - Wiley Online Library
Deep learning has evolved as a strong and efficient framework that can be applied to a
broad spectrum of complex learning problems which were difficult to solve using the …

[HTML][HTML] Review of artificial intelligence adversarial attack and defense technologies

S Qiu, Q Liu, S Zhou, C Wu - Applied Sciences, 2019 - mdpi.com
In recent years, artificial intelligence technologies have been widely used in computer
vision, natural language processing, automatic driving, and other fields. However, artificial …

Privacy and security issues in deep learning: A survey

X Liu, L **e, Y Wang, J Zou, J **ong, Z Ying… - IEEE …, 2020 - ieeexplore.ieee.org
Deep Learning (DL) algorithms based on artificial neural networks have achieved
remarkable success and are being extensively applied in a variety of application domains …

Threat of adversarial attacks on deep learning in computer vision: A survey

N Akhtar, A Mian - Ieee Access, 2018 - ieeexplore.ieee.org
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …

Turning your weakness into a strength: Watermarking deep neural networks by backdooring

Y Adi, C Baum, M Cisse, B Pinkas… - 27th USENIX security …, 2018 - usenix.org
Deep Neural Networks have recently gained lots of success after enabling several
breakthroughs in notoriously challenging problems. Training these networks is …

Adversarial example detection for DNN models: A review and experimental comparison

A Aldahdooh, W Hamidouche, SA Fezza… - Artificial Intelligence …, 2022 - Springer
Deep learning (DL) has shown great success in many human-related tasks, which has led to
its adoption in many computer vision based applications, such as security surveillance …

Adversarial examples for malware detection

K Grosse, N Papernot, P Manoharan, M Backes… - … –ESORICS 2017: 22nd …, 2017 - Springer
Abstract Machine learning models are known to lack robustness against inputs crafted by an
adversary. Such adversarial examples can, for instance, be derived from regular inputs by …

Machine learning with a reject option: A survey

K Hendrickx, L Perini, D Van der Plas, W Meert… - Machine Learning, 2024 - Springer
Abstract Machine learning models always make a prediction, even when it is likely to be
inaccurate. This behavior should be avoided in many decision support applications, where …

Adversarial machine learning applied to intrusion and malware scenarios: a systematic review

N Martins, JM Cruz, T Cruz, PH Abreu - IEEE Access, 2020 - ieeexplore.ieee.org
Cyber-security is the practice of protecting computing systems and networks from digital
attacks, which are a rising concern in the Information Age. With the growing pace at which …

Distortion agnostic deep watermarking

X Luo, R Zhan, H Chang, F Yang… - Proceedings of the …, 2020 - openaccess.thecvf.com
Watermarking is the process of embedding information into an image that can survive under
distortions, while requiring the encoded image to have little or no perceptual difference with …