We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 4,955 results
  1. Safety-critical computer vision: an empirical survey of adversarial evasion attacks and defenses on computer vision systems

    Considering the growing prominence of production-level AI and the threat of adversarial attacks that can poison a machine learning model against a...

    Charles Meyers, Tommy Löfstedt, Erik Elmroth in Artificial Intelligence Review
    Article Open access 23 June 2023
  2. Evaluation of neural networks defenses and attacks using NDCG and reciprocal rank metrics

    The problem of attacks on neural networks through input modification (i.e., adversarial examples) has attracted much attention recently. Being...

    Haya Brama, Lihi Dery, Tal Grinshpoun in International Journal of Information Security
    Article 21 December 2022
  3. Adversarial attacks and defenses for large language models (LLMs): methods, frameworks & challenges

    Large language models (LLMs) have exhibited remarkable efficacy and proficiency in a wide array of NLP endeavors. Nevertheless, concerns are growing...

    Article 25 June 2024
  4. State of the art on adversarial attacks and defenses in graphs

    Graph neural networks (GNNs) had shown excellent performance in complex graph data modelings such as node classification, link prediction and graph...

    Zhengli Zhai, Penghui Li, Shu Feng in Neural Computing and Applications
    Article 16 July 2023
  5. Intelligent Malware Defenses

    With rapidly evolving threat landscape surrounding malware, intelligent defenses based on machine learning are paramount. In this chapter, we review...
    Azqa Nadeem, Vera Rimmer, ... Sicco Verwer in Security and Artificial Intelligence
    Chapter 2022
  6. Understanding deep learning defenses against adversarial examples through visualizations for dynamic risk assessment

    In recent years, deep neural network models have been developed in different fields, where they have brought many advances. However, they have also...

    Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, ... Raul Orduna-Urrutia in Neural Computing and Applications
    Article 11 March 2022
  7. Attacks and Defenses of Smart Speakers: Voice Command Fingerprinting on Alexa

    Smart speakers, such as Amazon Alexa and Google Home, are a form of voice-based interactive technology that helps consumers solve queries with...
    Rohan Kathuria, Vinish Kathuria in Advanced Computing
    Conference paper 2023
  8. Stronger data poisoning attacks break data sanitization defenses

    Machine learning models trained on data from the outside world can be corrupted by data poisoning attacks that inject malicious points into the...

    Pang Wei Koh, Jacob Steinhardt, Percy Liang in Machine Learning
    Article 24 November 2021
  9. Deep learning adversarial attacks and defenses on license plate recognition system

    The breakthroughs in Machine learning and deep neural networks have revolutionized the handling of critical practical challenges, achieving...

    Conrado Vizcarra, Shadan Alhamed, ... Muhammad Anan in Cluster Computing
    Article Open access 01 June 2024
  10. Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives

    Empirical attacks on Federated Learning (FL) systems indicate that FL is fraught with numerous attack surfaces throughout the FL execution. These...

    Pengrui Liu, **angrui Xu, Wei Wang in Cybersecurity
    Article Open access 02 February 2022
  11. Towards Effective and Robust Neural Trojan Defenses via Input Filtering

    Trojan attacks on deep neural networks are both dangerous and surreptitious. Over the past few years, Trojan attacks have advanced from using only a...
    Kien Do, Haripriya Harikumar, ... Svetha Venkatesh in Computer Vision – ECCV 2022
    Conference paper 2022
  12. Adversarial Attacks and Defenses in Capsule Networks: A Critical Review of Robustness Challenges and Mitigation Strategies

    Capsule Networks (CapsNets) have gained significant attention in recent years due to their potential for improved representation learning and...
    Milind Shah, Kinjal Gandhi, ... Yash Patel in Advanced Computing Techniques in Engineering and Technology
    Conference paper 2024
  13. Synthesis of Optimal Defenses for System Architecture Design Model in MaxSMT

    Attack-Defense Trees (ADTrees) are widely used in the security analysis of software systems. In this paper, we introduce a novel approach to analyze...
    Baoluo Meng, Arjun Viswanathan, ... Michael Durling in NASA Formal Methods
    Conference paper 2022
  14. Effective and Lightweight Defenses Against Website Fingerprinting on Encrypted Traffic

    Recently, website fingerprinting (WF) attacks that eavesdrop on the web browsing activity of users by analyzing the observed traffic can endanger the...
    Chengpu Jiang, Zhenbo Gao, Meng Shen in Data Science
    Conference paper 2022
  15. Data Poisoning Attack and Defenses in Connectome-Based Predictive Models

    Connectome-based predictive models are widely used in the neuroimaging community and hold great clinical potential. Recent literature has focused on...
    Conference paper 2022
  16. A survey on adversarial attacks and defenses for object detection and their applications in autonomous vehicles

    Object detection is considered as one of the most important applications of deep learning. However, the object detection techniques lose their...

    Abdollah Amirkhani, Mohammad Parsa Karimi, Amin Banitalebi-Dehkordi in The Visual Computer
    Article 12 September 2022
  17. Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses

    Deep reinforcement learning (DRL) is vulnerable to adversarial perturbations. Adversaries can mislead the policies of DRL agents by perturbing the...
    Buse G. A. Tekgul, Shelly Wang, ... N. Asokan in Computer Security – ESORICS 2022
    Conference paper 2022
  18. Collaborative DoS Defenses

    Living reference work entry 2021
  19. Visual privacy attacks and defenses in deep learning: a survey

    The concerns on visual privacy have been increasingly raised along with the dramatic growth in image and video capture and sharing. Meanwhile, with...

    Guangsheng Zhang, Bo Liu, ... Wanlei Zhou in Artificial Intelligence Review
    Article 31 January 2022
  20. Hybrid AI-Based iBeacon Indoor Positioning Cybersecurity Attacks and Defenses Thereof

    Currently, iBeacon systems have been increasingly established in public areas to position people and assist users in indoor for location navigation....
    Fang-Yie Leu, Chi-Jan Huang, ... Wei-Tzu Hung in Smart Grid and Internet of Things
    Conference paper 2023
Did you find what you were looking for? Share feedback.