On Configurable Defense against Adversarial Example Attacks
Abstract
Supplementary Material
- Download
- 117.39 MB
References
Index Terms
- On Configurable Defense against Adversarial Example Attacks
Recommendations
AdvRefactor: A Resampling-Based Defense Against Adversarial Attacks
Advances in Multimedia Information Processing – PCM 2018AbstractDeep neural networks have achieved great success in many domains. However, they are vulnerable to adversarial attacks, which generate adversarial examples by adding tiny perturbations to legitimate images. Previous studies providing defense mostly ...
Defense Against Adversarial Attacks with Efficient Frequency-Adaptive Compression and Reconstruction
Highlights- This paper systematically analyzes the robustness of elimination-based defense under closed-set and open-set attacks. Experimental results show that the ...
AbstractThe increasing use of deep neural networks exposes themselves to adversarial attacks in the real world drawn from closed-set and open-set, which poses great threats to their application in safety-critical systems. Since adversarial ...
Defense against adversarial attacks by low‐level image transformations
AbstractDeep neural networks (DNNs) are vulnerable to adversarial examples, which can fool classifiers by maliciously adding imperceptible perturbations to the original input. Currently, a large number of research on defending adversarial examples pay ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Tinoosh Mohsenin,
- Weisheng Zhao,
- Program Chairs:
- Yiran Chen,
- Onur Mutlu
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 114Total Downloads
- Downloads (Last 12 months)4
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in