Cargando…

Minimum Adversarial Examples

Deep neural networks in the area of information security are facing a severe threat from adversarial examples (AEs). Existing methods of AE generation use two optimization models: (1) taking the successful attack as the objective function and limiting perturbations as the constraint; (2) taking the...

Descripción completa

Detalles Bibliográficos
Autores principales: Du, Zhenyu, Liu, Fangzheng, Yan, Xuehu
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8947511/
https://www.ncbi.nlm.nih.gov/pubmed/35327907
http://dx.doi.org/10.3390/e24030396