A survey of adversarial attack and defense methods for malware classification in cyber security
Malware poses a severe threat to cyber security. Attackers use malware to achieve their
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …
[HTML][HTML] Exploring generative adversarial networks and adversarial training
A Sajeeda, BMM Hossain - International Journal of Cognitive Computing in …, 2022 - Elsevier
Recognized as a realistic image generator, Generative Adversarial Network (GAN) occupies
a progressive section in deep learning. Using generative modeling, the underlying …
a progressive section in deep learning. Using generative modeling, the underlying …
Advdiffuser: Natural adversarial example synthesis with diffusion models
Previous work on adversarial examples typically involves a fixed norm perturbation budget,
which fails to capture the way humans perceive perturbations. Recent work has shifted …
which fails to capture the way humans perceive perturbations. Recent work has shifted …
Generalizable black-box adversarial attack with meta learning
In the scenario of black-box adversarial attack, the target model's parameters are unknown,
and the attacker aims to find a successful adversarial perturbation based on query feedback …
and the attacker aims to find a successful adversarial perturbation based on query feedback …
Tnt attacks! universal naturalistic adversarial patches against deep neural network systems
Deep neural networks (DNNs), regardless of their impressive performance, are vulnerable to
attacks from adversarial inputs and, more recently, Trojans to misguide or hijack the decision …
attacks from adversarial inputs and, more recently, Trojans to misguide or hijack the decision …
Adversarial attack and defense for medical image analysis: Methods and applications
Deep learning techniques have achieved superior performance in computer-aided medical
image analysis, yet they are still vulnerable to imperceptible adversarial attacks, resulting in …
image analysis, yet they are still vulnerable to imperceptible adversarial attacks, resulting in …
Ai-gan: Attack-inspired generation of adversarial examples
Deep neural networks (DNNs) are vulnerable to adversarial examples, which are crafted by
adding imperceptible perturbations to inputs. Recently different attacks and strategies have …
adding imperceptible perturbations to inputs. Recently different attacks and strategies have …
A novel multi-sample generation method for adversarial attacks
Deep learning models are widely used in daily life, which bring great convenience to our
lives, but they are vulnerable to attacks. How to build an attack system with strong …
lives, but they are vulnerable to attacks. How to build an attack system with strong …
FE-DaST: Fast and effective data-free substitute training for black-box adversarial attacks
M Yu, S Sun - Computers & Security, 2022 - Elsevier
Deep learning models have shown their advantages in computer vision, eg, image
classification, whereas they are well-known to be susceptible to imperceptible perturbations …
classification, whereas they are well-known to be susceptible to imperceptible perturbations …
A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier
Phishing is one of the most popular cyberspace attacks. Phishing detection has been
integrated into mainstream browsers to provide online protection. The phishing detector of …
integrated into mainstream browsers to provide online protection. The phishing detector of …