Articles with "adversarial attacks" as a keyword



Photo from wikipedia

Adversarial attacks on text classification models using layer‐wise relevance propagation

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Intelligent Systems"

DOI: 10.1002/int.22260

Abstract: Due to the nested nonlinear structure inside neural networks, most existing deep learning models are treated as black boxes, and they are highly vulnerable to adversarial attacks. On the one hand, adversarial examples shed light… read more here.

Keywords: layer wise; text classification; adversarial attacks; classification models ... See more keywords
Photo by maxchen2k from unsplash

Textual adversarial attacks by exchanging text‐self words

Sign Up to like & get
recommendations!
Published in 2022 at "International Journal of Intelligent Systems"

DOI: 10.1002/int.23083

Abstract: Adversarial attacks expose the vulnerability of deep neural networks. Compared to image adversarial attacks, textual adversarial attacks are more challenging due to the discrete nature of texts. Recent synonym‐based methods achieve the current state‐of‐the‐art results.… read more here.

Keywords: adversarial attacks; original text; textual adversarial; chaotic word ... See more keywords
Photo by mybbor from unsplash

DeepEC: Adversarial attacks against graph structure prediction models

Sign Up to like & get
recommendations!
Published in 2021 at "Neurocomputing"

DOI: 10.1016/j.neucom.2020.07.126

Abstract: Abstract Inspired by the practical importance of graph structured data, link prediction, one of the most frequently applied tasks on graph data, has garnered considerable attention in recent years, and they have been widely applied… read more here.

Keywords: attack; adversarial attacks; structure; link prediction ... See more keywords
Photo by joshuafernandez from unsplash

A New Threat for Pseudorange-Based RAIM: Adversarial Attacks on GNSS Positioning

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2939141

Abstract: Global Navigation Satellite System (GNSS) signals are very vulnerable to spoofing due to the low power level and opening service mode. Although pseudorange-based Receiver Autonomous Integrity Monitoring (RAIM) method performances effectively in spoofing detection and… read more here.

Keywords: pseudorange based; gnss positioning; raim; adversarial attacks ... See more keywords
Photo from wikipedia

Boosting 3D Adversarial Attacks with Attacking On Frequency

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3171659

Abstract: Deep neural networks (DNNs) have been shown to be vulnerable to adversarial attacks in the image domain. Recently, 3D adversarial attacks, especially adversarial attacks on point clouds, have elicited mounting interest. However, adversarial point clouds… read more here.

Keywords: adversarial attacks; point clouds; adversarial point; point cloud ... See more keywords
Photo from wikipedia

Strengthening Robustness Under Adversarial Attacks Using Brain Visual Codes

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3204995

Abstract: The vulnerability of computational models to adversarial examples highlights the differences in the ways humans and machines process visual information. Motivated by human perception invariance in object recognition, we aim to incorporate human brain representations… read more here.

Keywords: adversarial attacks; brain; using brain; attacks using ... See more keywords
Photo by hannahrdg from unsplash

Defensive Distillation-Based Adversarial Attack Mitigation Method for Channel Estimation Using Deep Learning Models in Next-Generation Wireless Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3206385

Abstract: Future wireless networks (5G and beyond), also known as Next Generation or NextG, are the vision of forthcoming cellular systems, connecting billions of devices and people together. In the last decades, cellular networks have dramatically… read more here.

Keywords: adversarial attacks; channel estimation; defensive distillation; next generation ... See more keywords
Photo from wikipedia

Universal Adversarial Attacks on the Raw Data From a Frequency Modulated Continuous Wave Radar

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3218349

Abstract: As more and more applications rely on Artificial Intelligence (AI), it is inevitable to explore the associated safety and security risks, especially for sensitive applications where physical integrity is at risk. One of the most… read more here.

Keywords: data frequency; adversarial attacks; universal adversarial; radar ... See more keywords
Photo from wikipedia

Toward Evaluating the Reliability of Deep-Neural-Network-Based IoT Devices

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3138969

Abstract: Nowadays, the impressive performance of deep neural networks (DNNs) greatly advances the development of Internet of Things (IoT) in diverse scenarios. However, the exceptional vulnerability of DNNs to adversarial attack leads IoT devices to be… read more here.

Keywords: adversarial attacks; adversarial examples; deep neural; iot devices ... See more keywords
Photo by repponen from unsplash

Rethinking Perturbation Directions for Imperceptible Adversarial Attacks on Point Clouds

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3222159

Abstract: Adversarial attacks have been successfully extended to the field of point clouds. Besides applying the common perturbation guided by the gradient, adversarial attacks on point clouds can be conducted by applying directional perturbations, e.g., along… read more here.

Keywords: adversarial attacks; point clouds; directional perturbations; attacks point ... See more keywords
Photo by kellysikkema from unsplash

Adversarial Attacks Against IoT Identification Systems

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3229906

Abstract: While machine learning (ML)-based solutions for Internet of Things (IoT) device identification are effective in identifying IoT devices connected to the network, they may be vulnerable to adversarial attacks. Conventional approaches for crafting adversarial attacks… read more here.

Keywords: adversarial attacks; device identification; identification; iot identification ... See more keywords