Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "International Journal of Intelligent Systems"
DOI: 10.1002/int.22260
Abstract: Due to the nested nonlinear structure inside neural networks, most existing deep learning models are treated as black boxes, and they are highly vulnerable to adversarial attacks. On the one hand, adversarial examples shed light…
read more here.
Keywords:
layer wise;
text classification;
adversarial attacks;
classification models ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "International Journal of Intelligent Systems"
DOI: 10.1002/int.23083
Abstract: Adversarial attacks expose the vulnerability of deep neural networks. Compared to image adversarial attacks, textual adversarial attacks are more challenging due to the discrete nature of texts. Recent synonym‐based methods achieve the current state‐of‐the‐art results.…
read more here.
Keywords:
adversarial attacks;
original text;
textual adversarial;
chaotic word ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Neurocomputing"
DOI: 10.1016/j.neucom.2020.07.126
Abstract: Abstract Inspired by the practical importance of graph structured data, link prediction, one of the most frequently applied tasks on graph data, has garnered considerable attention in recent years, and they have been widely applied…
read more here.
Keywords:
attack;
adversarial attacks;
structure;
link prediction ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2939141
Abstract: Global Navigation Satellite System (GNSS) signals are very vulnerable to spoofing due to the low power level and opening service mode. Although pseudorange-based Receiver Autonomous Integrity Monitoring (RAIM) method performances effectively in spoofing detection and…
read more here.
Keywords:
pseudorange based;
gnss positioning;
raim;
adversarial attacks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3171659
Abstract: Deep neural networks (DNNs) have been shown to be vulnerable to adversarial attacks in the image domain. Recently, 3D adversarial attacks, especially adversarial attacks on point clouds, have elicited mounting interest. However, adversarial point clouds…
read more here.
Keywords:
adversarial attacks;
point clouds;
adversarial point;
point cloud ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3204995
Abstract: The vulnerability of computational models to adversarial examples highlights the differences in the ways humans and machines process visual information. Motivated by human perception invariance in object recognition, we aim to incorporate human brain representations…
read more here.
Keywords:
adversarial attacks;
brain;
using brain;
attacks using ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3206385
Abstract: Future wireless networks (5G and beyond), also known as Next Generation or NextG, are the vision of forthcoming cellular systems, connecting billions of devices and people together. In the last decades, cellular networks have dramatically…
read more here.
Keywords:
adversarial attacks;
channel estimation;
defensive distillation;
next generation ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3218349
Abstract: As more and more applications rely on Artificial Intelligence (AI), it is inevitable to explore the associated safety and security risks, especially for sensitive applications where physical integrity is at risk. One of the most…
read more here.
Keywords:
data frequency;
adversarial attacks;
universal adversarial;
radar ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3138969
Abstract: Nowadays, the impressive performance of deep neural networks (DNNs) greatly advances the development of Internet of Things (IoT) in diverse scenarios. However, the exceptional vulnerability of DNNs to adversarial attack leads IoT devices to be…
read more here.
Keywords:
adversarial attacks;
adversarial examples;
deep neural;
iot devices ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3222159
Abstract: Adversarial attacks have been successfully extended to the field of point clouds. Besides applying the common perturbation guided by the gradient, adversarial attacks on point clouds can be conducted by applying directional perturbations, e.g., along…
read more here.
Keywords:
adversarial attacks;
point clouds;
directional perturbations;
attacks point ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3229906
Abstract: While machine learning (ML)-based solutions for Internet of Things (IoT) device identification are effective in identifying IoT devices connected to the network, they may be vulnerable to adversarial attacks. Conventional approaches for crafting adversarial attacks…
read more here.
Keywords:
adversarial attacks;
device identification;
identification;
iot identification ... See more keywords