Adversarial attacks and defenses in machine learning-empowered communication systems and networks: A contemporary survey

Y Wang, T Sun, S Li, X Yuan, W Ni… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Adversarial attacks and defenses in machine learning and deep neural network (DNN) have
been gaining significant attention due to the rapidly growing applications of deep learning in …

Defense against adversarial cloud attack on remote sensing salient object detection

H Sun, L Fu, J Li, Q Guo, Z Meng… - Proceedings of the …, 2024 - openaccess.thecvf.com
Detecting the salient objects in a remote sensing image has wide applications. Many
existing deep learning methods have been proposed for Salient Object Detection (SOD) in …

Exploring robust features for improving adversarial robustness

H Wang, Y Deng, S Yoo, Y Lin - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
While deep neural networks (DNNs) have revolutionized many fields, their fragility to
carefully designed adversarial attacks impedes the usage of DNNs in safety-critical …

Dd-robustbench: An adversarial robustness benchmark for dataset distillation

Y Wu, J Du, P Liu, Y Lin, W Xu, W Cheng - arXiv preprint arXiv:2403.13322, 2024 - arxiv.org
Dataset distillation is an advanced technique aimed at compressing datasets into
significantly smaller counterparts, while preserving formidable training performance …

Defense without Forgetting: Continual Adversarial Defense with Anisotropic & Isotropic Pseudo Replay

Y Zhou, Z Hua - Proceedings of the IEEE/CVF Conference …, 2024 - openaccess.thecvf.com
Deep neural networks have demonstrated susceptibility to adversarial attacks. Adversarial
defense techniques often focus on one-shot setting to maintain robustness against attack …

Like teacher, like pupil: Transferring backdoors via feature-based knowledge distillation

J Chen, Z Cao, R Chen, H Zheng, X Li, Q Xuan… - Computers & …, 2024 - Elsevier
With the widespread adoption of edge computing, compressing deep neural networks
(DNNs) via knowledge distillation (KD) has emerged as a popular technique for resource …

Meta Invariance Defense Towards Generalizable Robustness to Unknown Adversarial Attacks

L Zhang, Y Zhou, Y Yang, X Gao - IEEE Transactions on Pattern …, 2024 - ieeexplore.ieee.org
Despite providing high-performance solutions for computer vision tasks, the deep neural
network (DNN) model has been proved to be extremely vulnerable to adversarial attacks …

Adversarial Finetuning with Latent Representation Constraint to Mitigate Accuracy-Robustness Tradeoff

S Suzuki, S Yamaguchi, S Takeda… - 2023 IEEE/CVF …, 2023 - ieeexplore.ieee.org
This paper addresses the tradeoff between standard accuracy on clean examples and
robustness against adversarial examples in deep neural networks (DNNs). Although …

Minimizing Adversarial Training Samples for Robust Image Classifiers: Analysis and Adversarial Example Generator Design

Y Wang, T Sun, X Yuan, S Li… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Training deep neural networks (DNNs) with altered data, known as adversarial training, is
essential for improving their robustness. A significant challenge emerges as the robustness …

Remove To Regenerate: Boosting Adversarial Generalization with Attack Invariance

X Fu, L Ma, L Zhang - … Transactions on Circuits and Systems for …, 2024 - ieeexplore.ieee.org
Adversarial attacks pose a huge challenge to the deployment of deep neural networks
(DNNs) in security-sensitive applications. Adversarial defense methods are developed to …