Improving the reliability of deep neural networks in NLP: A review
B Alshemali, J Kalita - Knowledge-Based Systems, 2020 - Elsevier
Deep learning models have achieved great success in solving a variety of natural language
processing (NLP) problems. An ever-growing body of research, however, illustrates the …
processing (NLP) problems. An ever-growing body of research, however, illustrates the …
A comprehensive overview of biometric fusion
The performance of a biometric system that relies on a single biometric modality (eg,
fingerprints only) is often stymied by various factors such as poor data quality or limited …
fingerprints only) is often stymied by various factors such as poor data quality or limited …
Deep learning for face anti-spoofing: A survey
Face anti-spoofing (FAS) has lately attracted increasing attention due to its vital role in
securing face recognition systems from presentation attacks (PAs). As more and more …
securing face recognition systems from presentation attacks (PAs). As more and more …
Adversarial examples—Security threats to COVID-19 deep learning systems in medical IoT devices
Medical IoT devices are rapidly becoming part of management ecosystems for pandemics
such as COVID-19. Existing research shows that deep learning (DL) algorithms have been …
such as COVID-19. Existing research shows that deep learning (DL) algorithms have been …
Towards transferable adversarial attack against deep face recognition
Face recognition has achieved great success in the last five years due to the development of
deep learning methods. However, deep convolutional neural networks (DCNNs) have been …
deep learning methods. However, deep convolutional neural networks (DCNNs) have been …
Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures
Security and privacy of users have become significant concerns due to the involvement of
the Internet of Things (IoT) devices in numerous applications. Cyber threats are growing at …
the Internet of Things (IoT) devices in numerous applications. Cyber threats are growing at …
Biometrics: Trust, but verify
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …
applications around the globe. This proliferation can be attributed to the high levels of …
Think twice before detecting gan-generated fake images from their spectral domain imprints
Accurate detection of the fake but photorealistic images is one of the most challenging tasks
to address social, biometrics security and privacy related concerns in our community. Earlier …
to address social, biometrics security and privacy related concerns in our community. Earlier …
Benchmarking image classifiers for physical out-of-distribution examples detection
The rising popularity of deep neural networks (DNNs) in computer vision has raised
concerns about their robustness in the real world. Recent works in this field have well …
concerns about their robustness in the real world. Recent works in this field have well …
Image transformation-based defense against adversarial perturbation on deep learning models
Deep learning algorithms provide state-of-the-art results on a multitude of applications.
However, it is also well established that they are highly vulnerable to adversarial …
However, it is also well established that they are highly vulnerable to adversarial …