4.7 Article

Social IoT Approach to Cyber Defense of a Deep-Learning-Based Recognition System in Front of Media Clones Generated by Model Inversion Attack

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive Face Generation From a Face Recognition System

Mahdi Khosravy et al.

Summary: Model Inversion Attack (MIA) is a threat to user privacy in face recognition systems by generating data to reveal a user's identity. Deep MIA utilizes deep generative models to efficiently search for feature vectors that maximize the confidence score for creating high-quality face clones. Evaluation results show the effectiveness of the proposed technique in generating natural-looking face clones with high recognizability.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)

Article Computer Science, Artificial Intelligence

Deep transfer learning-based automated detection of COVID-19 from lung CT scan slices

Sakshi Ahuja et al.

Summary: In this research, transfer learning from CT scan images is used to detect COVID-19 with different pre-trained architectures, the results show that the ResNet18 model offers better classification accuracy compared to other alternatives.

APPLIED INTELLIGENCE (2021)

Article Automation & Control Systems

Event-Triggered Security Output Feedback Control for Networked Interconnected Systems Subject to Cyber-Attacks

Zhou Gu et al.

Summary: This article studies the security of networked interconnected systems (NISs) subjected to cyber-attacks using a new event-triggered mechanism (ETM) and decentralized output feedback control (DOFC) scheme. The proposed ETM reduces the data-releasing rate, thereby decreasing network burden, and generates more transmission events during external disturbances or attacks to achieve desired control performance. Stochastic analysis techniques and Lyapunov stability theory are used to derive sufficient conditions for obtaining controller gains and ETM parameters. Simulation results on chemical reactor systems demonstrate the advantages and effectiveness of the proposed theories and design techniques.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2021)

Article Automation & Control Systems

A Risk-Based Dynamic Decision-Making Approach for Cybersecurity Protection in Industrial Control Systems

Yuanqing Qin et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2020)

Article Engineering, Biomedical

Deep-segmentation of plantar pressure images convolutional neural networks

Dan Wang et al.

BIOCYBERNETICS AND BIOMEDICAL ENGINEERING (2020)

Article Computer Science, Artificial Intelligence

Two-Stage Human Activity Recognition Using 2D-ConvNet

Kamal Kant Verma et al.

INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE (2020)

Article Automation & Control Systems

A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks

Chen Peng et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2019)

Article Computer Science, Theory & Methods

Convolutional Neural Network Based American Sign Language Static Hand Gesture Recognition

Ravinder Ahuja et al.

INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE (2019)

Article Automation & Control Systems

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

Hichem Sedjelmaci et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2018)

Proceedings Paper Computer Science, Artificial Intelligence

VGGFace2: A dataset for recognising faces across pose and age

Qiong Cao et al.

PROCEEDINGS 2018 13TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE & GESTURE RECOGNITION (FG 2018) (2018)

Article Computer Science, Theory & Methods

Recognizing Driving Behavior and Road Anomaly using Smartphone Sensors

Aya Hamdy Ali et al.

INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE (2017)

Article Computer Science, Hardware & Architecture

ImageNet Classification with Deep Convolutional Neural Networks

Alex Krizhevsky et al.

COMMUNICATIONS OF THE ACM (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Densely Connected Convolutional Networks

Gao Huang et al.

30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017) (2017)

Proceedings Paper Computer Science, Information Systems

Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes

Seira Hidano et al.

2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST) (2017)

Article Automation & Control Systems

Multimodel-Based Incident Prediction and Risk Assessment in Dynamic Cybersecurity Protection for Industrial Control Systems

Qi Zhang et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2016)

Proceedings Paper Computer Science, Information Systems

Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures

Matt Fredrikson et al.

CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)

Article Engineering, Electrical & Electronic

Deep Learning: Methods and Applications

Li Deng et al.

FOUNDATIONS AND TRENDS IN SIGNAL PROCESSING (2013)

Article Computer Science, Information Systems

Collaborative Face Recognition for Improved Face Annotation in Personal Photo Collections Shared on Online Social Networks

Jae Young Choi et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2011)

Article Computer Science, Artificial Intelligence

A fast learning algorithm for deep belief nets

Geoffrey E. Hinton et al.

NEURAL COMPUTATION (2006)