Gradient-Based Adversarial Attacks Against Malware Detection by Instruction ReplacementDeep learning plays a vital role in malware detection. The Malconv is a well-known deep learning-based open source malware detection framework and is trained on raw bytes for malware binary detection. Researchers ...
Decoupling Direction and Norm for Efficient Gradient-Based Adversarial Attacks and Defenses 说在前面 1.提出的问题 2.提出的方法 2.1 相关工作 2.2 算法介绍 3.实验结果 3.1 Untargeted Attack 3.2 Targeted Attack 3.3 Defense Evaluation 4.结论 Decoupling Direction and Norm for Efficient Gradient-Based L2 Ad...
Adversarial attacks (AAs) pose a significant threat to the reliability and robustness of deep neural networks. While the impact of these attacks on model predictions has been extensively studied, their effect on the learned representatio... G Mikriukov,G Schwalbe,F Motzkus,... - Springer, Cham...
(Pathak, Lu, Hunt, Girvan, & Ott, 2017), for implementing reservoir based observers for spatio temporal complex systems (Lu et al., 2017, Zimmermann and Parlitz, 2018), for detection of smart grid attacks (Hamedani, Liu, Atat, Wu, & Yi, 2018) and for digit recognition (Jalalvand, ...
oracleCf(⋅,⋅). For further examples of optimization with human feedback, we refer the reader to [11], [12], [13], [14], [15], [16], [17]. In an entirely different direction, it has recently been observed that the problem of generating adversarial attacks on image classifiers ...
The cloud makes data storage more accessible and adaptable, but unwanted attacks and operations still exist. Sensitive data could be covertly stored on the cloud server. Data security is essential as a result. Here, we combine Stochastic Gradient Descent long short-term memory (SGD-LSTM) with ...
et al. Security constrained unit commitment in smart energy systems: A flexibility-driven approach considering false data injection attacks in electric vehicle parking lots. International Journal of Electrical Power and Energy Systems, 2024, 161: 110180. DOI:10.1016/j.ijepes.2024.110180 74. Rahman,...
In this paper,we f ind that existing IG-based attacks have limited trans-ferability due to their naive adoption of IG in model inter-pretability. To address this limitation, we focus on the IG inte-gration path and ref ine it in three aspects: multiplicity, mono-tonicity, and diversity,...
behavior of human–machine interactions. It provides a promising cyber security layer against password leaking and network attacks for the protection of personal information. In addition, the AIOM touch sensor can be functionalized as a linear interactive control interface or a circular touch panel for...
28 Oct 2021·Lifan Yuan,Yichi Zhang,Yangyi Chen,Wei Wei· Despite recent success on various tasks, deep learning techniques still perform poorly on adversarial examples with small perturbations. While optimization-based methods for adversarial attacks are well-explored in the field of computer vision...