Metaverse security and privacy: An overview

Z Chen, J Wu, W Gan, Z Qi - … Conference on Big Data (Big Data …, 2022 - ieeexplore.ieee.org
Metaverse is a living space and cyberspace that realizes the process of virtualizing and
digitizing the real world. It integrates a plethora of existing technologies with the goal of …

Backdoor attacks and countermeasures on deep learning: A comprehensive review

Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu… - arXiv preprint arXiv …, 2020 - arxiv.org
This work provides the community with a timely comprehensive review of backdoor attacks
and countermeasures on deep learning. According to the attacker's capability and affected …

Deep learning for anomaly detection: A survey

R Chalapathy, S Chawla - arXiv preprint arXiv:1901.03407, 2019 - arxiv.org
Anomaly detection is an important problem that has been well-studied within diverse
research areas and application domains. The aim of this survey is two-fold, firstly we present …

Neural cleanse: Identifying and mitigating backdoor attacks in neural networks

B Wang, Y Yao, S Shan, H Li… - … IEEE symposium on …, 2019 - ieeexplore.ieee.org
Lack of transparency in deep neural networks (DNNs) make them susceptible to backdoor
attacks, where hidden associations or triggers override normal classification to produce …

Strip: A defence against trojan attacks on deep neural networks

Y Gao, C Xu, D Wang, S Chen… - Proceedings of the 35th …, 2019 - dl.acm.org
A recent trojan attack on deep neural network (DNN) models is one insidious variant of data
poisoning attacks. Trojan attacks exploit an effective backdoor created in a DNN model by …

Privacy and security issues in deep learning: A survey

X Liu, L Xie, Y Wang, J Zou, J Xiong, Z Ying… - IEEE …, 2020 - ieeexplore.ieee.org
Deep Learning (DL) algorithms based on artificial neural networks have achieved
remarkable success and are being extensively applied in a variety of application domains …

Countering adversarial images using input transformations

C Guo, M Rana, M Cisse, L Van Der Maaten - arXiv preprint arXiv …, 2017 - arxiv.org
This paper investigates strategies that defend against adversarial-example attacks on image-
classification systems by transforming the inputs before feeding them to the system …

Threat of adversarial attacks on deep learning in computer vision: A survey

N Akhtar, A Mian - Ieee Access, 2018 - ieeexplore.ieee.org
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …

Towards fast computation of certified robustness for relu networks

L Weng, H Zhang, H Chen, Z Song… - International …, 2018 - proceedings.mlr.press
Verifying the robustness property of a general Rectified Linear Unit (ReLU) network is an NP-
complete problem. Although finding the exact minimum adversarial distortion is hard, giving …

Evaluating the robustness of neural networks: An extreme value theory approach

TW Weng, H Zhang, PY Chen, J Yi, D Su, Y Gao… - arXiv preprint arXiv …, 2018 - arxiv.org
The robustness of neural networks to adversarial examples has received great attention due
to security implications. Despite various attack approaches to crafting visually imperceptible …