Adversarial Examples Identification in an End-to-End System With Image Transformation and Filters
Deep learning has been receiving great attention in recent years because of its impressive performance in many tasks. However, the widespread adoption of deep learning also becomes a major security risk for those systems as recent researches have pointed out the vulnerabilities of deep learning mode...
Main Authors: | Dang Duy Thang, Toshihiro Matsui |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9022936/ |
Similar Items
-
Smooth adversarial examples
by: Hanwei Zhang, et al.
Published: (2020-11-01) -
On the Effectiveness of Adversarial Training in Defending against Adversarial Example Attacks for Image Classification
by: Sanglee Park, et al.
Published: (2020-11-01) -
Hadamard’s Defense Against Adversarial Examples
by: Angello Hoyos, et al.
Published: (2021-01-01) -
Adversarial example defense algorithm for MNIST based on image reconstruction
by: Zhongyuan QIN, et al.
Published: (2022-02-01) -
Adversarial example defense algorithm for MNIST based on image reconstruction
by: QIN Zhongyuan, HE Zhaoxiang, et al.
Published: (2022-02-01)