Novel defense based on softmax activation transformation

Deep learning is widely used in various fields such as image processing, natural language processing, network mining and so on.However, it is vulnerable to malicious adversarial attacks and many defensive methods have been proposed accordingly.Most defense methods are attack-dependent and require de...

Full description

Bibliographic Details
Main Authors: Jinyin CHEN, Changan WU, Haibin ZHENG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2022-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2022016