Cargando…
Minimum Adversarial Examples
Deep neural networks in the area of information security are facing a severe threat from adversarial examples (AEs). Existing methods of AE generation use two optimization models: (1) taking the successful attack as the objective function and limiting perturbations as the constraint; (2) taking the...
Autores principales: | Du, Zhenyu, Liu, Fangzheng, Yan, Xuehu |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8947511/ https://www.ncbi.nlm.nih.gov/pubmed/35327907 http://dx.doi.org/10.3390/e24030396 |
Ejemplares similares
-
Sparse Adversarial Video Attacks via Superpixel-Based Jacobian Computation
por: Du, Zhenyu, et al.
Publicado: (2022) -
Approaching Adversarial Example Classification with Chaos Theory
por: Pedraza, Anibal, et al.
Publicado: (2020) -
Universal adversarial examples and perturbations for quantum
classifiers
por: Gong, Weiyuan, et al.
Publicado: (2021) -
Experimental demonstration of adversarial examples in learning topological phases
por: Zhang, Huili, et al.
Publicado: (2022) -
Adversarial example defense based on image reconstruction
por: Zhang, Yu(AUST), et al.
Publicado: (2021)