Lowkey: Leveraging adversarial attacks to protect social media users from facial recognition

V Cherepanova, M Goldblum, H Foley, S Duan… - arXiv preprint arXiv …, 2021 - arxiv.org
Facial recognition systems are increasingly deployed by private corporations, government
agencies, and contractors for consumer services and mass surveillance programs alike …

Strong data augmentation sanitizes poisoning and backdoor attacks without an accuracy tradeoff

E Borgnia, V Cherepanova, L Fowl… - ICASSP 2021-2021 …, 2021 - ieeexplore.ieee.org
Data poisoning and backdoor attacks manipulate victim models by maliciously modifying
training data. In light of this growing threat, a recent survey of industry professionals …

Adversarial training against location-optimized adversarial patches

S Rao, D Stutz, B Schiele - European conference on computer vision, 2020 - Springer
Deep neural networks have been shown to be susceptible to adversarial examples–small,
imperceptible changes constructed to cause mis-classification in otherwise highly accurate …

The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models

T Chaalan, S Pang, J Kamruzzaman, I Gondal… - ACM Computing …, 2024 - dl.acm.org
Data Poisoning Attacks (DPA) represent a sophisticated technique aimed at distorting the
training data of machine learning models, thereby manipulating their behavior. This process …

Adversarial attacks on machine learning systems for high-frequency trading

M Goldblum, A Schwarzschild, A Patel… - Proceedings of the …, 2021 - dl.acm.org
Algorithmic trading systems are often completely automated, and deep learning is
increasingly receiving attention in this domain. Nonetheless, little is known about the …

Random and adversarial bit error robustness: Energy-efficient and secure DNN accelerators

D Stutz, N Chandramoorthy, M Hein… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Deep neural network (DNN) accelerators received considerable attention in recent years
due to the potential to save energy compared to mainstream hardware. Low-voltage …

Lcanets++: Robust audio classification using multi-layer neural networks with lateral competition

SV Dibbo, JS Moore, GT Kenyon… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Audio classification aims at recognizing audio signals, including speech commands or
sound events. However, current audio classifiers are susceptible to perturbations and …

Unfolded algorithms for deep phase retrieval

N Naimipour, S Khobahi, M Soltanalian - arXiv preprint arXiv:2012.11102, 2020 - arxiv.org
Exploring the idea of phase retrieval has been intriguing researchers for decades, due to its
appearance in a wide range of applications. The task of a phase retrieval algorithm is …

Stealthy Adversarial Attacks on Machine Learning-Based Classifiers of Wireless Signals

W Zhang, M Krunz, G Ditzler - IEEE Transactions on Machine …, 2024 - ieeexplore.ieee.org
Machine learning (ML) has been successfully applied to classification tasks in many
domains, including computer vision, cybersecurity, and communications. Although highly …

Secure Machine Learning Based RF Signal Classification for Wireless Systems

W Zhang - 2024 - search.proquest.com
To monitor the activity over a radio frequency (RF) channel and coordinate its access among
heterogeneous wireless systems, network administrators and/or users must be able to …