A survey of practical adversarial example attacks
Abstract Adversarial examples revealed the weakness of machine learning techniques in terms of robustness, which moreover inspired adversaries to make use of the weakness to attack systems employing machine learning. Existing researches covered the methodologies of adversarial example generation, th...
Main Authors: | Lu Sun, Mingtian Tan, Zhe Zhou |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2018-09-01
|
Series: | Cybersecurity |
Subjects: | |
Online Access: | http://link.springer.com/article/10.1186/s42400-018-0012-9 |
Similar Items
-
On the Effectiveness of Adversarial Training in Defending against Adversarial Example Attacks for Image Classification
by: Sanglee Park, et al.
Published: (2020-11-01) -
A Hybrid Adversarial Attack for Different Application Scenarios
by: Xiaohu Du, et al.
Published: (2020-05-01) -
Adversarial attack and defense in reinforcement learning-from AI security view
by: Tong Chen, et al.
Published: (2019-03-01) -
An Effective Adversarial Attack on Person Re-Identification in Video Surveillance via Dispersion Reduction
by: Yu Zheng, et al.
Published: (2020-01-01) -
A Two-Stage Generative Adversarial Networks With Semantic Content Constraints for Adversarial Example Generation
by: Jianyi Liu, et al.
Published: (2020-01-01)