4.8 Article

Adversarial Examples-Security Threats to COVID-19 Deep Learning Systems in Medical IoT Devices

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

Understanding adversarial attacks on deep learning based medical image analysis systems

Xingjun Ma et al.

Summary: This paper delves into the issue of adversarial examples in medical image analysis, finding that medical DNN models are more vulnerable to adversarial attacks compared to models for natural images. Furthermore, it is noted that medical adversarial attacks can be easily detected, with simple detectors achieving over 98% detection AUC.

PATTERN RECOGNITION (2021)

Article Computer Science, Artificial Intelligence

Blockchain for explainable and trustworthy artificial intelligence

Mohamed Nassar et al.

WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY (2020)

Article Engineering, Electrical & Electronic

Adversarial attacks on fingerprint liveness detection

Jianwei Fei et al.

EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING (2020)

Article Engineering, Multidisciplinary

Adversarial Attacks and Defenses in Deep Learning

Kui Ren et al.

ENGINEERING (2020)

Article Computer Science, Hardware & Architecture

Explainable AI and Mass Surveillance System-Based Healthcare Framework to Combat COVID-I9 Like Pandemics

M. Shamim Hossain et al.

IEEE NETWORK (2020)

Article Computer Science, Hardware & Architecture

B5G and Explainable Deep Learning Assisted Healthcare Vertical at the Edge: COVID-I9 Perspective

Md Abdur Rahman et al.

IEEE NETWORK (2020)

Article Computer Science, Information Systems

Probabilistic Analysis of Targeted Attacks Using Transform-Domain Adversarial Examples

Zakia Yahya et al.

IEEE ACCESS (2020)

Article Computer Science, Artificial Intelligence

Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition

Gaurav Goswami et al.

INTERNATIONAL JOURNAL OF COMPUTER VISION (2019)

Article Computer Science, Information Systems

Blockchain and IoT-Based Cognitive Edge Framework for Sharing Economy Services in a Smart City

Md Abdur Rahman et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Information Systems

MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples

Jinyuan Jia et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Article Computer Science, Information Systems

Generating Adversarial Examples in One Shot With Image-to-Image Translation GAN

Weijia Zhang

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Emotion-Aware Connected Healthcare Big Data Towards 5G

M. Shamim Hossain et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Blockchain-Based Mobile Edge Computing Framework for Secure Therapy Applications

Abdur Rahman et al.

IEEE ACCESS (2018)