Edge learning for 6G-enabled Internet of Things: A comprehensive survey of vulnerabilities, datasets, and defenses

MA Ferrag, O Friha, B Kantarci… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The deployment of the fifth-generation (5G) wireless networks in Internet of Everything (IoE)
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …

Reflection backdoor: A natural backdoor attack on deep neural networks

Y Liu, X Ma, J Bailey, F Lu - Computer Vision–ECCV 2020: 16th European …, 2020 - Springer
Recent studies have shown that DNNs can be compromised by backdoor attacks crafted at
training time. A backdoor attack installs a backdoor into the victim model by injecting a …

Neural attention distillation: Erasing backdoor triggers from deep neural networks

Y Li, X Lyu, N Koren, L Lyu, B Li, X Ma - arXiv preprint arXiv:2101.05930, 2021 - arxiv.org
Deep neural networks (DNNs) are known vulnerable to backdoor attacks, a training time
attack that injects a trigger pattern into a small proportion of training data so as to control the …

Improving adversarial robustness requires revisiting misclassified examples

Y Wang, D Zou, J Yi, J Bailey, X Ma… - … conference on learning …, 2019 - openreview.net
Deep neural networks (DNNs) are vulnerable to adversarial examples crafted by
imperceptible perturbations. A range of defense techniques have been proposed to improve …

Understanding adversarial attacks on deep learning based medical image analysis systems

X Ma, Y Niu, L Gu, Y Wang, Y Zhao, J Bailey, F Lu - Pattern Recognition, 2021 - Elsevier
Deep neural networks (DNNs) have become popular for medical image analysis tasks like
cancer diagnosis and lesion detection. However, a recent study demonstrates that medical …

A comprehensive study of deep video action recognition

Y Zhu, X Li, C Liu, M Zolfaghari, Y Xiong, C Wu… - arXiv preprint arXiv …, 2020 - arxiv.org
Video action recognition is one of the representative tasks for video understanding. Over the
last decade, we have witnessed great advancements in video action recognition thanks to …

Skip connections matter: On the transferability of adversarial examples generated with resnets

D Wu, Y Wang, ST Xia, J Bailey, X Ma - arXiv preprint arXiv:2002.05990, 2020 - arxiv.org
Skip connections are an essential component of current state-of-the-art deep neural
networks (DNNs) such as ResNet, WideResNet, DenseNet, and ResNeXt. Despite their …

Clean-label backdoor attacks on video recognition models

S Zhao, X Ma, X Zheng, J Bailey… - Proceedings of the …, 2020 - openaccess.thecvf.com
Deep neural networks (DNNs) are vulnerable to backdoor attacks which can hide backdoor
triggers in DNNs by poisoning training data. A backdoored model behaves normally on …

Adversarial camouflage: Hiding physical-world attacks with natural styles

R Duan, X Ma, Y Wang, J Bailey… - Proceedings of the …, 2020 - openaccess.thecvf.com
Deep neural networks (DNNs) are known to be vulnerable to adversarial examples. Existing
works have mostly focused on either digital adversarial examples created via small and …

On improving adversarial transferability of vision transformers

M Naseer, K Ranasinghe, S Khan, FS Khan… - arXiv preprint arXiv …, 2021 - arxiv.org
Vision transformers (ViTs) process input images as sequences of patches via self-attention;
a radically different architecture than convolutional neural networks (CNNs). This makes it …