Threat of adversarial attacks on deep learning in computer vision: A survey

N Akhtar, A Mian - Ieee Access, 2018 - ieeexplore.ieee.org
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …

Dverge: diversifying vulnerabilities for enhanced robust generation of ensembles

H Yang, J Zhang, H Dong… - Advances in …, 2020 - proceedings.neurips.cc
Recent research finds CNN models for image classification demonstrate overlapped
adversarial vulnerabilities: adversarial attacks can mislead CNN models with small …

Countering adversarial attacks on autonomous vehicles using denoising techniques: A review

A Kloukiniotis, A Papandreou, A Lalos… - IEEE Open Journal …, 2022 - ieeexplore.ieee.org
The evolution of automotive technology will eventually permit the automated driving system
on the vehicle to handle all circumstances. Human occupants will be just passengers. This …

Improving adversarial robustness of ensembles with diversity training

S Kariyappa, MK Qureshi - arXiv preprint arXiv:1901.09981, 2019 - arxiv.org
Deep Neural Networks are vulnerable to adversarial attacks even in settings where the
attacker has no direct access to the model being attacked. Such attacks usually rely on the …

Adversarially robust 3d point cloud recognition using self-supervisions

J Sun, Y Cao, CB Choy, Z Yu… - Advances in …, 2021 - proceedings.neurips.cc
Abstract 3D point cloud data is increasingly used in safety-critical applications such as
autonomous driving. Thus, the robustness of 3D deep learning models against adversarial …

Verification for machine learning, autonomy, and neural networks survey

W Xiang, P Musau, AA Wild, DM Lopez… - arXiv preprint arXiv …, 2018 - arxiv.org
This survey presents an overview of verification techniques for autonomous systems, with a
focus on safety-critical autonomous cyber-physical systems (CPS) and subcomponents …

Security risk and attacks in AI: A survey of security and privacy

MM Rahman, AS Arshi, MM Hasan… - 2023 IEEE 47th …, 2023 - ieeexplore.ieee.org
This survey paper provides an overview of the current state of AI attacks and risks for AI
security and privacy as artificial intelligence becomes more prevalent in various applications …

Learn2perturb: an end-to-end feature perturbation learning to improve adversarial robustness

A Jeddi, MJ Shafiee, M Karg… - Proceedings of the …, 2020 - openaccess.thecvf.com
While deep neural networks have been achieving state-of-the-art performance across a
wide variety of applications, their vulnerability to adversarial attacks limits their widespread …

Enhancing cross-task black-box transferability of adversarial examples with dispersion reduction

Y Lu, Y Jia, J Wang, B Li, W Chai… - Proceedings of the …, 2020 - openaccess.thecvf.com
Neural networks are known to be vulnerable to carefully crafted adversarial examples, and
these malicious samples often transfer, ie, they remain adversarial even against other …

Unleashing the power of visual prompting at the pixel level

J Wu, X Li, C Wei, H Wang, A Yuille, Y Zhou… - arXiv preprint arXiv …, 2022 - arxiv.org
This paper presents a simple and effective visual prompting method for adapting pre-trained
models to downstream recognition tasks. Our method includes two key designs. First, rather …