Fine perceptive gans for brain mr image super-resolution in wavelet domain

S You, B Lei, S Wang, CK Chui… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Magnetic resonance (MR) imaging plays an important role in clinical and brain exploration.
However, limited by factors such as imaging hardware, scanning time, and cost, it is …

A data balancing approach based on generative adversarial network

L Yuan, S Yu, Z Yang, M Duan, K Li - Future Generation Computer Systems, 2023 - Elsevier
Intrusion detection is an effective means of ensuring the proper functioning of industrial
control systems (ICSs). Most intrusion detection algorithms learn the historical ICS data to …

Towards intrinsic adversarial robustness through probabilistic training

J Dong, L Yang, Y Wang, X Xie… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Modern deep neural networks have made numerous breakthroughs in real-world
applications, yet they remain vulnerable to some imperceptible adversarial perturbations …

A novel multi-sample generation method for adversarial attacks

M Duan, K Li, J Deng, B Xiao, Q Tian - ACM Transactions on Multimedia …, 2022 - dl.acm.org
Deep learning models are widely used in daily life, which bring great convenience to our
lives, but they are vulnerable to attacks. How to build an attack system with strong …

Rethinking impersonation and dodging attacks on face recognition systems

F Zhou, Q Zhou, B Yin, H Zheng, X Lu, L Ma… - Proceedings of the 32nd …, 2024 - dl.acm.org
Face Recognition (FR) systems can be easily deceived by adversarial examples that
manipulate benign face images through imperceptible perturbations. Adversarial attacks on …

ACGIS: Adversarial cover generator for image steganography with noise residuals features-preserving

J Yang, X Liao - Signal Processing: Image Communication, 2023 - Elsevier
Recent works with the technique of adversarial example have been bringing the possibility
of effectively resisting the machine learning-based steganalyzers. Nevertheless, these …

A novel anomaly detection method for digital twin data using deconvolution operation with attention mechanism

Z Li, M Duan, B Xiao, S Yang - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
In recent years, industrial control systems have evolved toward stability and efficiency,
increasing industrial control systems interconnected with the Internet, which means that …

Dual attention adversarial attacks with limited perturbations

M Duan, Y Qin, J Deng, K Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The construction of undetectable adversarial examples with few perturbances remains a
difficult problem in adversarial attacks. At present, most solutions use the standard gradient …

Boosting adversarial transferability via fusing logits of top-1 decomposed feature

J Weng, Z Luo, D Lin, S Li, Z Zhong - arXiv preprint arXiv:2305.01361, 2023 - arxiv.org
Recent research has shown that Deep Neural Networks (DNNs) are highly vulnerable to
adversarial samples, which are highly transferable and can be used to attack other unknown …

Resilient countermeasures against Cyber-Attacks on Self-Driving car architecture

JM Qurashi, K Jambi, F Alsolami… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Self-driving cars, believed to be on track to become a seven trillion-dollar industry by 2050,
are likely to be a popular mode of transportation in the near future, as the technology …