Advances in adversarial attacks and defenses in computer vision: A survey

N Akhtar, A Mian, N Kardan, M Shah - IEEE Access, 2021 - ieeexplore.ieee.org
Deep Learning is the most widely used tool in the contemporary field of computer vision. Its
ability to accurately solve complex problems is employed in vision research to learn deep …

Adversarial attacks and defenses in machine learning-empowered communication systems and networks: A contemporary survey

Y Wang, T Sun, S Li, X Yuan, W Ni… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Adversarial attacks and defenses in machine learning and deep neural network (DNN) have
been gaining significant attention due to the rapidly growing applications of deep learning in …

Diffusion models for adversarial purification

W Nie, B Guo, Y Huang, C Xiao, A Vahdat… - arXiv preprint arXiv …, 2022 - arxiv.org
Adversarial purification refers to a class of defense methods that remove adversarial
perturbations using a generative model. These methods do not make assumptions on the …

Adversarial weight perturbation helps robust generalization

D Wu, ST Xia, Y Wang - Advances in neural information …, 2020 - proceedings.neurips.cc
The study on improving the robustness of deep neural networks against adversarial
examples grows rapidly in recent years. Among them, adversarial training is the most …

Hardware-aware training for large-scale and diverse deep learning inference workloads using in-memory computing-based accelerators

MJ Rasch, C Mackin, M Le Gallo, A Chen… - Nature …, 2023 - nature.com
Analog in-memory computing—a promising approach for energy-efficient acceleration of
deep learning workloads—computes matrix-vector multiplications but only approximately …

Threat of adversarial attacks on deep learning in computer vision: A survey

N Akhtar, A Mian - Ieee Access, 2018 - ieeexplore.ieee.org
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …

Privacy preserving Federated Learning framework for IoMT based big data analysis using edge computing

AK Nair, J Sahoo, ED Raj - Computer Standards & Interfaces, 2023 - Elsevier
The current industrial scenario has witnessed the application of several artificial intelligence-
based technologies for mining and processing IoMT-based big data. An emerging …

Tbt: Targeted neural network attack with bit trojan

AS Rakin, Z He, D Fan - … of the IEEE/CVF Conference on …, 2020 - openaccess.thecvf.com
Abstract Security of modern Deep Neural Networks (DNNs) is under severe scrutiny as the
deployment of these models become widespread in many intelligence-based applications …

Deepsteal: Advanced model extractions leveraging efficient weight stealing in memories

AS Rakin, MHI Chowdhuryy, F Yao… - 2022 IEEE symposium …, 2022 - ieeexplore.ieee.org
Recent advancements in Deep Neural Networks (DNNs) have enabled widespread
deployment in multiple security-sensitive domains. The need for resource-intensive training …

Simulating a primary visual cortex at the front of CNNs improves robustness to image perturbations

J Dapello, T Marques, M Schrimpf… - Advances in …, 2020 - proceedings.neurips.cc
Current state-of-the-art object recognition models are largely based on convolutional neural
network (CNN) architectures, which are loosely inspired by the primate visual system …