4.7 Review

Interpreting Adversarial Examples in Deep Learning: A Review

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

Understanding adversarial attacks on deep learning based medical image analysis systems

Xingjun Ma et al.

Summary: This paper delves into the issue of adversarial examples in medical image analysis, finding that medical DNN models are more vulnerable to adversarial attacks compared to models for natural images. Furthermore, it is noted that medical adversarial attacks can be easily detected, with simple detectors achieving over 98% detection AUC.

PATTERN RECOGNITION (2021)

Proceedings Paper Computer Science, Hardware & Architecture

Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis

Fengting Li et al.

Summary: The paper introduces a generic defense system called TaintRadar for accurately detecting localized adversarial examples by analyzing critical regions manipulated by attackers. TaintRadar can effectively capture sophisticated localized partial attacks without requiring additional training or fine-tuning of the original model's structure. Comprehensive experiments in both digital and physical worlds verify the effectiveness and robustness of the defense system.

IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021) (2021)

Article Computer Science, Artificial Intelligence

Robustness to adversarial examples can be improved with overfitting

Oscar Deniz et al.

INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS (2020)

Article Computer Science, Artificial Intelligence

Principal Component Adversarial Example

Yonggang Zhang et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2020)

Article Computer Science, Artificial Intelligence

One Pixel Attack for Fooling Deep Neural Networks

Jiawei Su et al.

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Universal Adversarial Perturbation via Prior Driven Uncertainty Approximation

Hong Liu et al.

2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019) (2019)

Article Computer Science, Information Systems

Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey

Naveed Akhtar et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Correction of AI systems by linear discriminants: Probabilistic foundations

A. N. Gorban et al.

INFORMATION SCIENCES (2018)

Proceedings Paper Computer Science, Information Systems

Towards Evaluating the Robustness of Neural Networks

Nicholas Carlini et al.

2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)

Review Multidisciplinary Sciences

Deep learning

Yann LeCun et al.

NATURE (2015)

Proceedings Paper Computer Science, Artificial Intelligence

A Unified Gradient Regularization Family for Adversarial Examples

Chunchuan Lyu et al.

2015 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM) (2015)

Article Engineering, Civil

Aleatory or epistemic? Does it matter?

Armen Der Kiureghian et al.

STRUCTURAL SAFETY (2009)

Article Computer Science, Information Systems

Calibrating noise to sensitivity in private data analysis

Cynthia Dwork et al.

THEORY OF CRYPTOGRAPHY, PROCEEDINGS (2006)

Article Statistics & Probability

Additive logistic regression: A statistical view of boosting

J Friedman et al.

ANNALS OF STATISTICS (2000)