A survey of adversarial attack and defense methods for malware classification in cyber security

S Yan, J Ren, W Wang, L Sun… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Malware poses a severe threat to cyber security. Attackers use malware to achieve their
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …

[HTML][HTML] Exploring generative adversarial networks and adversarial training

A Sajeeda, BMM Hossain - International Journal of Cognitive Computing in …, 2022 - Elsevier
Recognized as a realistic image generator, Generative Adversarial Network (GAN) occupies
a progressive section in deep learning. Using generative modeling, the underlying …

Advdiffuser: Natural adversarial example synthesis with diffusion models

X Chen, X Gao, J Zhao, K Ye… - Proceedings of the IEEE …, 2023 - openaccess.thecvf.com
Previous work on adversarial examples typically involves a fixed norm perturbation budget,
which fails to capture the way humans perceive perturbations. Recent work has shifted …

Generalizable black-box adversarial attack with meta learning

F Yin, Y Zhang, B Wu, Y Feng, J Zhang… - IEEE transactions on …, 2023 - ieeexplore.ieee.org
In the scenario of black-box adversarial attack, the target model's parameters are unknown,
and the attacker aims to find a successful adversarial perturbation based on query feedback …

Tnt attacks! universal naturalistic adversarial patches against deep neural network systems

BG Doan, M Xue, S Ma, E Abbasnejad… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Deep neural networks (DNNs), regardless of their impressive performance, are vulnerable to
attacks from adversarial inputs and, more recently, Trojans to misguide or hijack the decision …

Adversarial attack and defense for medical image analysis: Methods and applications

J Dong, J Chen, X Xie, J Lai, H Chen - arXiv e-prints, 2023 - ui.adsabs.harvard.edu
Deep learning techniques have achieved superior performance in computer-aided medical
image analysis, yet they are still vulnerable to imperceptible adversarial attacks, resulting in …

Ai-gan: Attack-inspired generation of adversarial examples

T Bai, J Zhao, J Zhu, S Han, J Chen… - … Conference on Image …, 2021 - ieeexplore.ieee.org
Deep neural networks (DNNs) are vulnerable to adversarial examples, which are crafted by
adding imperceptible perturbations to inputs. Recently different attacks and strategies have …

A novel multi-sample generation method for adversarial attacks

M Duan, K Li, J Deng, B Xiao, Q Tian - ACM Transactions on Multimedia …, 2022 - dl.acm.org
Deep learning models are widely used in daily life, which bring great convenience to our
lives, but they are vulnerable to attacks. How to build an attack system with strong …

FE-DaST: Fast and effective data-free substitute training for black-box adversarial attacks

M Yu, S Sun - Computers & Security, 2022 - Elsevier
Deep learning models have shown their advantages in computer vision, eg, image
classification, whereas they are well-known to be susceptible to imperceptible perturbations …

A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier

C Miao, J Feng, W You, W Shi, J Huang… - Proceedings of the 2023 …, 2023 - dl.acm.org
Phishing is one of the most popular cyberspace attacks. Phishing detection has been
integrated into mainstream browsers to provide online protection. The phishing detector of …