Semantic Adversarial Attacks on Face Recognition Through Significant Attributes

YM Khedr, Y Xiong, K He - International Journal of Computational …, 2023 - Springer
Face recognition systems are susceptible to adversarial attacks, where adversarial facial
images are generated without awareness of the intrinsic attributes of the images in existing …

Exploring the Impact of Conceptual Bottlenecks on Adversarial Robustness of Deep Neural Networks

B Rasheed, M Abdelhamid, A Khan, I Menezes… - IEEE …, 2024 - ieeexplore.ieee.org
Deep neural networks (DNNs), while powerful, often suffer from a lack of interpretability and
vulnerability to adversarial attacks. Concept bottleneck models (CBMs), which incorporate …

ATRA: Efficient adversarial training with high-robust area

S Liu, Y Han - The Visual Computer, 2024 - Springer
Recent research has shown the vulnerability of deep networks to adversarial perturbations.
Adversarial training and its variants have been shown to be effective defense algorithms …

Enhancing the Transferability of Adversarial Patch via Alternating Minimization

Y Wang, L Chen, Z Yang, T Cao - International Journal of Computational …, 2024 - Springer
Adversarial patches, a type of adversarial example, pose serious security threats to deep
neural networks (DNNs) by inducing erroneous outputs. Existing gradient stabilization …

Structure Estimation of Adversarial Distributions for Enhancing Model Robustness: A Clustering-Based Approach

B Rasheed, A Khan, A Masood Khattak - Applied Sciences, 2023 - mdpi.com
In this paper, we propose an advanced method for adversarial training that focuses on
leveraging the underlying structure of adversarial perturbation distributions. Unlike …

An Attack Traffic Identification Method Based on Temporal Spectrum

W Xie, J Yin, Z Chen - arXiv preprint arXiv:2411.07510, 2024 - arxiv.org
To address the issues of insufficient robustness, unstable features, and data noise
interference in existing network attack detection and identification models, this paper …