Articles with "adversarial robustness" as a keyword



Photo by efekurnaz from unsplash

Ensemble of Random Binary Output Encoding for Adversarial Robustness

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2937604

Abstract: Despite the excellent classification performance, recent research has revealed that the Convolutional Neural Network (CNN) could be readily deceived by only the small adversarial perturbation. Its imperceptible to human eyes and transferability from one model… read more here.

Keywords: robustness; ensemble random; adversarial robustness; binary output ... See more keywords
Photo by hudsoncrafted from unsplash

Evaluating Adversarial Robustness of Secret Key-Based Defenses

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3162874

Abstract: The vulnerability of neural networks to adversarial attacks has inspired the proposal of many defenses. Key-based input transformation techniques are the recently proposed methods that make use of gradient obfuscation to improve the adversarial robustness… read more here.

Keywords: key based; based defenses; adversarial robustness; transformation ... See more keywords
Photo by framesforyourheart from unsplash

RoHNAS: A Neural Architecture Search Framework With Conjoint Optimization for Adversarial Robustness and Hardware Efficiency of Convolutional and Capsule Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3214312

Abstract: Neural Architecture Search (NAS) algorithms aim at finding efficient Deep Neural Network (DNN) architectures for a given application under given system constraints. DNNs are computationally-complex as well as vulnerable to adversarial attacks. In order to… read more here.

Keywords: hardware; robustness hardware; hardware efficiency; adversarial robustness ... See more keywords
Photo by thoughtcatalog from unsplash

Adversarial robustness assessment: Why in evaluation both L0 and L∞ attacks are necessary

Sign Up to like & get
recommendations!
Published in 2022 at "PLoS ONE"

DOI: 10.1371/journal.pone.0265723

Abstract: There are different types of adversarial attacks and defences for machine learning algorithms which makes assessing the robustness of an algorithm a daunting task. Moreover, there is an intrinsic bias in these adversarial attacks and… read more here.

Keywords: adversarial robustness; robustness; robustness assessment; assessment evaluation ... See more keywords