To make yourself invisible with Adversarial Semantic Contours

Y Zhang, Z Zhu, H Su, J Zhu, S Zheng, Y He… - Computer Vision and …, 2023 - Elsevier
Modern object detectors are vulnerable to adversarial examples, which may bring risks to
real-world applications. The sparse attack is an important task which, compared with the …

The Impact of Simultaneous Adversarial Attacks on Robustness of Medical Image Analysis

S Pal, S Rahman, M Beheshti, A Habib, Z Jadidi… - IEEE …, 2024 - ieeexplore.ieee.org
Deep learning models are widely used in healthcare systems. However, deep learning
models are vulnerable to attacks themselves. Significantly, due to the black-box nature of the …

A Robust and Secure Edge-Based AI System Against Adversarial Attacks

SA Sørensen - 2023 - oda.oslomet.no
Ensuring the safe deployment and use of artificial intelligence (AI) in safety-critical systems
is crucial in the reality of effective adversarial attacks (AAs). AAs involve manipulating the …