A fourier perspective on model robustness in computer vision
Achieving robustness to distributional shift is a longstanding and challenging goal of
computer vision. Data augmentation is a commonly used approach for improving …
computer vision. Data augmentation is a commonly used approach for improving …
Feature distillation: Dnn-oriented jpeg compression against adversarial examples
Image compression-based approaches for defending against the adversarial-example
attacks, which threaten the safety use of deep neural networks (DNN), have been …
attacks, which threaten the safety use of deep neural networks (DNN), have been …
Adversarial examples are a natural consequence of test error in noise
Over the last few years, the phenomenon of adversarial examples—maliciously constructed
inputs that fool trained machine learning models—has captured the attention of the research …
inputs that fool trained machine learning models—has captured the attention of the research …
Adversarial examples are a natural consequence of test error in noise
Over the last few years, the phenomenon of adversarial examples---maliciously constructed
inputs that fool trained machine learning models---has captured the attention of the research …
inputs that fool trained machine learning models---has captured the attention of the research …
Coordinated Flaw Disclosure for AI: Beyond Security Vulnerabilities
Harm reporting in Artificial Intelligence (AI) currently lacks a structured process for disclosing
and addressing algorithmic flaws, relying largely on an ad-hoc approach. This contrasts …
and addressing algorithmic flaws, relying largely on an ad-hoc approach. This contrasts …
Coordinated Flaw Disclosure for AI: Beyond Security Vulnerabilities
Abstract Harm reporting in Artificial Intelligence (AI) currently lacks a structured process for
disclosing and addressing algorithmic flaws, relying largely on an ad-hoc approach. This …
disclosing and addressing algorithmic flaws, relying largely on an ad-hoc approach. This …
Universal adversarial perturbations through the lens of deep steganography: Towards a fourier perspective
The booming interest in adversarial attacks stems from a misalignment between human
vision and a deep neural network (DNN),\ie~ a human imperceptible perturbation fools the …
vision and a deep neural network (DNN),\ie~ a human imperceptible perturbation fools the …
Review on image processing based adversarial example defenses in computer vision
Recent research works showed that deep neural networks are vulnerable to adversarial
examples, which are usually maliciously created by carefully adding deliberate and …
examples, which are usually maliciously created by carefully adding deliberate and …
DeSVig: Decentralized swift vigilance against adversarial attacks in industrial artificial intelligence systems
Individually reinforcing the robustness of a single deep learning model only gives limited
security guarantees especially when facing adversarial examples. In this article, we propose …
security guarantees especially when facing adversarial examples. In this article, we propose …
MalJPEG: Machine learning based solution for the detection of malicious JPEG images
In recent years, cyber-attacks against individuals, businesses, and organizations have
increased. Cyber criminals are always looking for effective vectors to deliver malware to …
increased. Cyber criminals are always looking for effective vectors to deliver malware to …