xAdversarialAttacksandDefences:ASurveyANIRBANCHAKRABORTY∗IndianInstituteofTechnologyKharagpurIndiaMANAARALAMIndianInstituteofTechnologyKharagpurIndiaVISHALDEYTheOhioStateUniversityColumbusUnitedStatesANUPAMCHATTOPADHYAYNanyangTechnologicalUniversitySi
be used in all types of attack scenarios to design a robust deep learning system.Herein,the authors attempt to provide a detailed discussion on different types of adversarial attacks with various threat models and also elaborate on the efficiency and challenges of recent countermeasures against them....
A survey on adversarial attacks and defences Deep learning has evolved as a strong and efficient framework that can be applied to a broad spectrum of complex learning problems which were difficult to ... A Chakraborty,M Alam,V Dey,... - 《Caai Transactions on Intelligence Technology》 被引量...
Adversarial Attacks and Defences: A Surveyhttps://arxiv.org/pdf/1810.00069.pdf Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Surveyhttps://arxiv.org/pdf/1801.00553.pdf Are Self-Driving Cars Secure? Evasion Attacks against Deep Neural Networks for Steering Angle Predictionhttp...
Chakraborty A, Alam M, Dey V, Chattopadhyay A, Mukhopadhyay D (2021) A survey onadversarial attacks and defences. CAAI Trans Intell Technol 6(1):25–45. https://doi.org/10.1049/cit2.12028 Article Google Scholar Chen P-Y, Zhang H, Sharma Y, Yi J, Hsieh C-J (2017) ZOO: Zeroth ...
NIPS 2017 会上,由 Ian Goodfellow 牵头举办了第一届 Adversarial Attacks and Defences(对抗攻击防御)比赛。在这次比赛中,清华组成的团队在三个比赛项目中得到了冠军。 在防御上的主要思路、方法有下面这三类:在学习中修改训练过程或输入样本数据,例如把对抗样本加入模型训练中,修改网络,或者利用附加网络。 其中,针对...
Mukhopadhyay, Adversarial attacks and defences: a survey, arXiv preprint arXiv:1810.00069(2018). Google Scholar [23] C. Xie, Y. Wu, L.v.d. Maaten, A.L. Yuille, K. He Feature denoising for improving adversarial robustness IEEE Conference on Computer Vision and Pattern Recognition (2019), ...
(2018). Adversarial attacks and defences: A survey. arXiv:1810.00069. Chen, J. and Ngo, C.-W. (2016). Deep-based ingredient recognition for cooking recipe retrieval. In ACM Multimedia. Chen, Y., Zhu, X., and Gong, S. (2017). Person re-identification by deep learning multi-scale ...
TNNLS 2019Adversarial Examples: Attacks and Defenses for Deep Learning IEEE ACCESS 2018Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey 2019Adversarial Attacks and Defenses in Images, Graphs and Text: A Review 2019A Study of Black Box Adversarial Attacks in Computer Vision...
Although other security issues pertaining to confidentiality and privacy have been drawn attention in deep learning [45, 46, 47], we focus on the attacks that degrade the performance of deep learning models, cause an increase of false positives and false negatives. • The rest of the threat ...