Related references
Note: Only part of the references are listed.
Article
Computer Science, Artificial Intelligence
Cyclical Adversarial Attack Pierces Black-box Deep Neural Networks
Lifeng Huang et al.
Summary: In this paper, the authors propose Cyclical Adversarial Attack (CA2), a method that uses cyclical optimization algorithm to generate adversarial examples and enhance the transferability between models. Extensive experiments demonstrate the effectiveness and superiority of this method.
PATTERN RECOGNITION (2022)
Article
Computer Science, Artificial Intelligence
Understanding adversarial attacks on deep learning based medical image analysis systems
Xingjun Ma et al.
Summary: This paper delves into the issue of adversarial examples in medical image analysis, finding that medical DNN models are more vulnerable to adversarial attacks compared to models for natural images. Furthermore, it is noted that medical adversarial attacks can be easily detected, with simple detectors achieving over 98% detection AUC.
PATTERN RECOGNITION (2021)
Article
Computer Science, Artificial Intelligence
Scalable Gaussian process-based transfer surrogates for hyperparameter optimization
Martin Wistuba et al.
MACHINE LEARNING (2018)