Towards Compact Single Image Dehazing via Task-related Contrastive Network

W Yi, L Dong, M Liu, M Hui, L Kong, Y Zhao - Expert Systems with …, 2024 - Elsevier
Single image dehazing is a challenging vision task that recovers haze-free images from
observed hazy images. Recently, numerous learning-based dehazing methods have been …

Dual-polarization defogging method based on frequency division and blind separation of polarization information

F Huang, C Ke, X Wu, Y Liu - Optics Express, 2024 - opg.optica.org
The current advancements in image processing have led to significant progress in
polarization defogging methods. However, most existing approaches are not suitable for …

[HTML][HTML] Predicting the Impact of Data Poisoning Attacks in Blockchain-Enabled Supply Chain Networks

UJ Butt, O Hussien, K Hasanaj, K Shaalan, B Hassan… - Algorithms, 2023 - mdpi.com
As computer networks become increasingly important in various domains, the need for
secure and reliable networks becomes more pressing, particularly in the context of …

[HTML][HTML] Challenges and Countermeasures of Federated Learning Data Poisoning Attack Situation Prediction

J Wu, J Jin, C Wu - Mathematics, 2024 - mdpi.com
Federated learning is a distributed learning method used to solve data silos and privacy
protection in machine learning, aiming to train global models together via multiple clients …

Poisoning Attacks on Federated Learning for Autonomous Driving

S Garg, H Jönsson, G Kalander, A Nilsson… - arXiv preprint arXiv …, 2024 - arxiv.org
Federated Learning (FL) is a decentralized learning paradigm, enabling parties to
collaboratively train models while keeping their data confidential. Within autonomous …

DaBA: Data-free Backdoor Attack against Federated Learning via Malicious Server

K Chen, L Fang, M Wang, C Yin - … International Conference on …, 2023 - ieeexplore.ieee.org
Current research shows that the privacy of FL is threatened by an honest-but-curious server.
However, existing research focus on privacy attacks against the malicious server while …

[HTML][HTML] Decomposing texture and semantic for out-of-distribution detection

JH Moon, N Ahn, KA Sohn - Expert Systems with Applications, 2024 - Elsevier
The out-of-distribution (OOD) detection task assumes samples that follow the distribution of
training data as in-distribution (ID), while samples from other data distributions are …

Data poisoning: issues, challenges, and needs

M Aljanabi, AH Omran, MM Mijwil… - 7th IET Smart Cities …, 2023 - ieeexplore.ieee.org
Data poisoning attacks, where adversaries manipulate training data to degrade model
performance, are an emerging threat as machine learning becomes widely deployed in …

An Overview of Artificial Intelligence Security Issues

Z Wang, Y Dong, Z Xiang… - Artificial Intelligence …, 2024 - ebooks.iospress.nl
Artificial intelligence (AI) technology promotes human civilization, while it also raises
concerns, mainly related to security. AI plays a double-edged sword role in the network …