Adversarial example detection using semantic graph matching

Y Gong, S Wang, X Jiang, L Yin, F Sun - Applied Soft Computing, 2023 - Elsevier
Deep neural networks have recently been found to be vulnerable to adversarial examples,
which can deceive attacked models with high confidence. This has given rise to significant …

Improving the transferability of adversarial examples with separable positive and negative disturbances

Y Yan, Y Bu, F Shen, J Zhao - Neural Computing and Applications, 2024 - Springer
Adversarial examples demonstrate the vulnerability of white-box models but exhibit weak
transferability to black-box models. In image processing, each adversarial example usually …

Detecting adversarial samples by noise injection and denoising

H Zhang, X Zhang, Y Sun, L Ji - Image and Vision Computing, 2024 - Elsevier
Deep learning models are highly vulnerable to adversarial examples, leading to significant
attention on techniques for detecting them. However, current methods primarily rely on …

GGT: Graph-guided testing for adversarial sample detection of deep neural network

Z Chen, R Wang, J Xiang, Y Yu, X Xia, S Ji, Q Xuan… - Computers & …, 2024 - Elsevier
Abstract Deep Neural Networks (DNN) are known to be vulnerable to adversarial samples,
the detection of which is crucial for the wide application of these DNN models. While existing …

Graph-based methods coupled with specific distributional distances for adversarial attack detection

D Nwaigwe, L Carboni, M Mermillod, S Achard, M Dojat - Neural Networks, 2024 - Elsevier
Artificial neural networks are prone to being fooled by carefully perturbed inputs which
cause an egregious misclassification. These adversarial attacks have been the focus of …

Federated learning in medical image analysis

E Darzidehkalani - 2024 - research.rug.nl
This thesis explores the application of Federated Learning (FL) in healthcare and medical
imaging, addressing the key challenge of utilizing large, dispersed medical datasets while …

Applications of fault-tolerant software architecture principles in the detection of adversarial attacks

PM Allport - 2023 - ntnuopen.ntnu.no
In November of 2022, the European Union Agency for Cybersecurity (ENISA) released its
2022 ENISA Threat Landscape Report (ETL), which describes the observed threats in the …

[引用][C] 针对未知攻击的泛化性对抗防御技术综述

周大为, 徐一搏, 王楠楠, 刘德成, 彭春蕾, 高新波 - 中国图象图形学报

[引用][C] Adversarial attacks on federated learning networks for medical image analysis

E Darzidehkalani, M Sijtsema, PMA van Ooijen