Articles with "adversarial attack" as a keyword



Toward feature space adversarial attack in the frequency domain

Sign Up to like & get
recommendations!
Published in 2022 at "International Journal of Intelligent Systems"

DOI: 10.1002/int.23031

Abstract: Recent researchers have shown that deep neural networks (DNNs) are vulnerable to adversarial exemplars, making them unsuitable for security‐critical applications. Transferability of adversarial examples is crucial for attacking black‐box models, which facilitates adversarial attacks in… read more here.

Keywords: frequency domain; space; adversarial attack; feature space ... See more keywords

Adversarial attack of sequence-free enhancer prediction identifies chromatin architecture

Sign Up to like & get
recommendations!
Published in 2025 at "Bioinformatics"

DOI: 10.1093/bioinformatics/btaf371

Abstract: Abstract Motivation The wide range of cellular complexity created by multicellular organisms is due in large part to the intricate and synergistic interplay of regulatory complexes throughout the eukaryotic genome. These regulatory elements “enhance” specific… read more here.

Keywords: enhancer prediction; attack sequence; enhancer; adversarial attack ... See more keywords

Black-Box Audio Adversarial Attack Using Particle Swarm Optimization

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3152526

Abstract: The development of artificial neural networks and artificial intelligence has helped to address problems and improve services in various fields, such as autonomous driving, image classification, medical diagnosis, and speech recognition. However, this technology has… read more here.

Keywords: black box; optimization; adversarial attack; adversarial examples ... See more keywords

Adversarial Attack Using Sparse Representation of Feature Maps

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3222531

Abstract: Deep neural networks can be fooled by small imperceptible perturbations called adversarial examples. Although these examples are carefully crafted, they involve two major concerns. In some cases, adversarial examples generated are much larger than minimal… read more here.

Keywords: adversarial examples; feature; adversarial attack; feature maps ... See more keywords

Adversarial Attack and Defence Strategies for Deep-Learning-Based IoT Device Classification Techniques

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3138541

Abstract: Concurrent advancements in machine learning (ML) and Internet of Things have allowed several interesting interdisciplinary applications, such as classification tasks based on data generated by smart devices for applications, such as security, resource allocation, activity… read more here.

Keywords: deep learning; defence; adversarial attack; classification ... See more keywords

MAS-PD: Transferable Adversarial Attack Against Vision-Transformers-Based SAR Image Classification Task

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing"

DOI: 10.1109/jstars.2025.3546271

Abstract: Synthetic aperture radar (SAR) is widely used in civil and military fields. With advancements in vision transformer (ViT) research, these models have become increasingly important in SAR image classification due to their remarkable performance. Therefore,… read more here.

Keywords: classification; image classification; attack; sar image ... See more keywords

Hyperspectral Image Classification With Adversarial Attack

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Geoscience and Remote Sensing Letters"

DOI: 10.1109/lgrs.2021.3122170

Abstract: The performance of a neural network is highly dependent on the labeled samples. However, the labeled samples are primarily clean, which prevents the network from capturing the features of the samples near the decision boundary.… read more here.

Keywords: adversarial attack; hyperspectral image; classification; boundary adversarial ... See more keywords

Attributed Scattering Center Guided Adversarial Attack for DCNN SAR Target Recognition

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Geoscience and Remote Sensing Letters"

DOI: 10.1109/lgrs.2023.3235051

Abstract: Recently, deep learning has made significant progress in synthetic aperture radar automatic target recognition (SAR ATR). However, deep convolutional neural networks (DCNNs) are discovered to be susceptible to carefully crafted adversarial perturbations. Regarding the unique… read more here.

Keywords: adversarial attack; attributed scattering; target recognition; target ... See more keywords

Physical Adversarial Attack on a Robotic Arm

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Robotics and Automation Letters"

DOI: 10.1109/lra.2022.3189783

Abstract: Collaborative Robots (cobots) are regarded as highly safety-critical cyber-physical systems (CPSs) owing to their close physical interactions with humans. In settings such as smart factories, they are frequently augmented with AI. For example, in order… read more here.

Keywords: robotic arm; physical adversarial; adversarial attack; attack robotic ... See more keywords

Explore Adversarial Attack via Black Box Variational Inference

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Signal Processing Letters"

DOI: 10.1109/lsp.2022.3208417

Abstract: From the perspective of probability, we propose a new method for black-box adversarial attack via black-box variational inference (BBVI), where the knowledge of victim model is unavailable. Instead of obtaining a single point, the proposed… read more here.

Keywords: via black; black box; box; adversarial attack ... See more keywords

Enhancing Adversarial Attack Detection in EEG Signals With Covariance Entropy: A Novel Framework for BCI Security

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Signal Processing Letters"

DOI: 10.1109/lsp.2025.3580330

Abstract: Brain-computer interfaces (BCIs) facilitate direct brain-to-external device connection by using machine learning to interpret EEG data. However, these systems are vulnerable to adversarial attacks that can lead to faulty outputs and potentially severe consequences. This… read more here.

Keywords: attack detection; adversarial attack; enhancing adversarial; covariance entropy ... See more keywords