A Comprehensive Risk Analysis Method for Adversarial Attacks on Biometric Authentication Systems

SH Park, SH Lee, MY Lim, PM Hong, YK Lee - IEEE Access, 2024 - ieeexplore.ieee.org
Recent threats to deep learning-based biometric authentication systems stem from
adversarial attacks exploiting vulnerabilities in deep learning models. While existing studies …

Adversarial Example Attacks in Internet of Things (IoT)

Y Gu, N Jiang, Y Chen, X Gong - … Conference on Edge Computing and IoT, 2022 - Springer
Abstract Recently, the Internet of Things (IoT) technology has made tremendous progress,
and it is beginning to enter many areas of social life, such as autonomous driving, medical …

Adversarial Training for Better Robustness

H Cao, M Xue - … Conference on Intelligent Edge Processing in the IoT …, 2022 - Springer
As the vulnerabilities of neural networks are gradually exposed, the security of deep
learning attracts the thoughtful attention of researchers. Adversarial training is a promising …