Metaverse security and privacy: An overview
Z Chen, J Wu, W Gan, Z Qi - … Conference on Big Data (Big Data …, 2022 - ieeexplore.ieee.org
Metaverse is a living space and cyberspace that realizes the process of virtualizing and
digitizing the real world. It integrates a plethora of existing technologies with the goal of …
digitizing the real world. It integrates a plethora of existing technologies with the goal of …
Backdoor attacks and countermeasures on deep learning: A comprehensive review
This work provides the community with a timely comprehensive review of backdoor attacks
and countermeasures on deep learning. According to the attacker's capability and affected …
and countermeasures on deep learning. According to the attacker's capability and affected …
Deep learning for anomaly detection: A survey
R Chalapathy, S Chawla - arXiv preprint arXiv:1901.03407, 2019 - arxiv.org
Anomaly detection is an important problem that has been well-studied within diverse
research areas and application domains. The aim of this survey is two-fold, firstly we present …
research areas and application domains. The aim of this survey is two-fold, firstly we present …
Neural cleanse: Identifying and mitigating backdoor attacks in neural networks
Lack of transparency in deep neural networks (DNNs) make them susceptible to backdoor
attacks, where hidden associations or triggers override normal classification to produce …
attacks, where hidden associations or triggers override normal classification to produce …
Strip: A defence against trojan attacks on deep neural networks
A recent trojan attack on deep neural network (DNN) models is one insidious variant of data
poisoning attacks. Trojan attacks exploit an effective backdoor created in a DNN model by …
poisoning attacks. Trojan attacks exploit an effective backdoor created in a DNN model by …
Privacy and security issues in deep learning: A survey
Deep Learning (DL) algorithms based on artificial neural networks have achieved
remarkable success and are being extensively applied in a variety of application domains …
remarkable success and are being extensively applied in a variety of application domains …
Countering adversarial images using input transformations
This paper investigates strategies that defend against adversarial-example attacks on image-
classification systems by transforming the inputs before feeding them to the system …
classification systems by transforming the inputs before feeding them to the system …
Threat of adversarial attacks on deep learning in computer vision: A survey
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …
computer vision, it has become the workhorse for applications ranging from self-driving cars …
Towards fast computation of certified robustness for relu networks
Verifying the robustness property of a general Rectified Linear Unit (ReLU) network is an NP-
complete problem. Although finding the exact minimum adversarial distortion is hard, giving …
complete problem. Although finding the exact minimum adversarial distortion is hard, giving …
Evaluating the robustness of neural networks: An extreme value theory approach
The robustness of neural networks to adversarial examples has received great attention due
to security implications. Despite various attack approaches to crafting visually imperceptible …
to security implications. Despite various attack approaches to crafting visually imperceptible …