We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Adversarial example detection by predicting adversarial noise in the frequency domain

    Recent advances in deep neural network (DNN) techniques have increased the importance of security and robustness of algorithms where DNNs are...

    Seunghwan Jung, Minyoung Chung, Yeong-Gil Shin in Multimedia Tools and Applications
    Article 16 February 2023
  2. Adversarial example generation for object detection using a data augmentation framework and momentum

    Object detection plays a vital role in numerous fields, including unmanned vehicles, security, and industry, among others. However, recent studies...

    Zhiyi Ding, Lei Sun, ... Bayi Xu in Signal, Image and Video Processing
    Article 28 December 2023
  3. Adversarial Example Detection with Latent Representation Dynamic Prototype

    In the realm of Deep Neural Networks (DNNs), one of the primary concerns is their vulnerability in adversarial environments, whereby malicious...
    Taowen Wang, Zhuang Qian, ** Yang in Neural Information Processing
    Conference paper 2024
  4. Attribute-guided face adversarial example generation

    Deep neural networks (DNNs) are susceptible to adversarial examples generally generated by adding imperceptible perturbations to the clean images,...

    Yan Gan, **nyao **ao, Tao **ang in The Visual Computer
    Article 07 February 2024
  5. Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network

    Artificial Intelligence (AI)-based IDS systems are susceptible to adversarial attacks and face challenges such as complex evaluation methods,...

    Kousik Barik, Sanjay Misra, Luis Fernandez-Sanz in International Journal of Information Security
    Article Open access 12 April 2024
  6. Adversarial example detection based on saliency map features

    In recent years, machine learning has greatly improved image recognition capability. However, studies have shown that neural network models are...

    Shen Wang, Yuxin Gong in Applied Intelligence
    Article 06 September 2021
  7. Revisiting model’s uncertainty and confidences for adversarial example detection

    Security-sensitive applications that rely on Deep Neural Networks (DNNs) are vulnerable to small perturbations that are crafted to generate...

    Ahmed Aldahdooh, Wassim Hamidouche, Olivier Déforges in Applied Intelligence
    Article 19 April 2022
  8. Semi-supervised lung nodule detection with adversarial learning

    Lung cancer has long posed a severe threat to human life and health, and early detection as well as effective treatment can significantly improve the...

    Qinlu He, Pengze Gao, ... Chen Chen in Multimedia Tools and Applications
    Article 17 April 2024
  9. FD-GAN: Generalizable and Robust Forgery Detection via Generative Adversarial Networks

    Generalization across various forgeries and robustness against corruption are pressing challenges of forgery detection. Although previous works boost...

    Nanqing Xu, Weiwei Feng, ... Yongdong Zhang in International Journal of Computer Vision
    Article 26 June 2024
  10. A non-global disturbance targeted adversarial example algorithm combined with C&W and Grad-Cam

    Adversarial examples are artificially crafted to mislead deep learning systems into making wrong decisions. In the research of attack algorithms...

    Yinghui Zhu, Yuzhen Jiang in Neural Computing and Applications
    Article 18 August 2023
  11. A low-frequency adversarial attack method for object detection using generative model

    Object detection is widely employed in security-critical scenarios. With the rapid development of deep learning, deep learning-based object detection...

    Long Yuan, Junmei Sun, ... Sisi Liu in Multimedia Tools and Applications
    Article 30 January 2024
  12. Adversarial Example Attacks and Defenses in DNS Data Exfiltration

    The Domain Network System (DNS) protocol is used on a daily basis to access the internet. It acts as a phone book that allows users to access...
    Izabela Savić, Haonan Yan, ... Daniel Gillis in Emerging Information Security and Applications
    Conference paper 2024
  13. Clustering-based attack detection for adversarial reinforcement learning

    Detecting malicious attacks presents a major challenge in the field of reinforcement learning (RL), as such attacks can force the victim to perform...

    Rubén Majadas, Javier García, Fernando Fernández in Applied Intelligence
    Article Open access 06 February 2024
  14. X-Detect: explainable adversarial patch detection for object detectors in retail

    Object detection models, which are widely used in various domains (such as retail), have been shown to be vulnerable to adversarial attacks. Existing...

    Omer Hofman, Amit Giloni, ... Asaf Shabtai in Machine Learning
    Article Open access 19 June 2024
  15. Graph-based domain adversarial learning framework for video anomaly detection domain generalization

    The limited domain generalization capability of contemporary video anomaly detection methods restricts their efficacy to specific datasets. To...

    Xue Mei, Yachuan Wei, Haoyang Chen in The Journal of Supercomputing
    Article 25 May 2024
  16. Detection of adversarial attacks based on differences in image entropy

    Although deep neural networks (DNNs) have achieved high performance across various applications, they are often deceived by adversarial examples...

    Gwonsang Ryu, Daeseon Choi in International Journal of Information Security
    Article Open access 17 August 2023
  17. Unveiling vulnerabilities: evading YOLOv5 object detection through adversarial perturbations and steganography

    In the realm of machine learning, a discernible surge in research has been observed, focusing on the development of adversarial perturbations with...

    Gauri Sharma, Urvashi Garg in Multimedia Tools and Applications
    Article 15 February 2024
  18. An adversarial pedestrian detection model based on virtual fisheye image training

    Fisheye camera is an important sensor in on-board systems and surveillance systems. However, the current fisheye image pedestrian detection still...

    **dong Zhang, Jian Dou in Signal, Image and Video Processing
    Article 12 February 2024
  19. Cycle map** with adversarial event classification network for fake news detection

    In recent years, there is a increase in researchers’ interest on social evidence, particularly for fake news detection (FND). However, news posts on...

    Fei Wu, Hong Zhou, ... **ao-Yuan **g in Multimedia Tools and Applications
    Article 14 February 2024
  20. A two-stage adversarial Transformer based approach for multivariate industrial time series anomaly detection

    Sensors in complex industrial systems generate multivariate time series data, frequently leading to diverse abnormal patterns that pose challenges...

    Junfu Chen, Dechang Pi, **xuan Wang in Applied Intelligence
    Article 23 March 2024
Did you find what you were looking for? Share feedback.