Articles with "adversarial defense" as a keyword



Photo from wikipedia

Perturbation Inactivation Based Adversarial Defense for Face Recognition

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3195384

Abstract: Deep learning-based face recognition models are vulnerable to adversarial attacks. To curb these attacks, most defense methods aim to improve the robustness of recognition models against adversarial perturbations. However, the generalization capacities of these methods… read more here.

Keywords: recognition; face recognition; defense; adversarial defense ... See more keywords
Photo by kingjaizer from unsplash

Consensus Adversarial Defense Method Based on Augmented Examples

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3169973

Abstract: Deep learning has been used in many computer-vision-based industrial Internet of Things applications. However, deep neural networks are vulnerable to adversarial examples that have been crafted specifically to fool a system while being imperceptible to… read more here.

Keywords: consensus adversarial; cons def; augmented examples; defense ... See more keywords
Photo by lensingmyworld from unsplash

A Mask-Based Adversarial Defense Scheme

Sign Up to like & get
recommendations!
Published in 2022 at "Algorithms"

DOI: 10.48550/arxiv.2204.11837

Abstract: Adversarial attacks hamper the functionality and accuracy of deep neural networks (DNNs) by meddling with subtle perturbations to their inputs. In this work, we propose a new mask-based adversarial defense scheme (MAD) for DNNs to… read more here.

Keywords: based adversarial; defense scheme; defense; adversarial defense ... See more keywords