Skip to content
  • Home
  • Book Bag: 0 items (Full)
    • English
    • 日本語
    • 中文(简体)
    • 中文(繁體)
    • اللغة العربية
  • About
Advanced
  • Attacks based on malicious per...
  • Cite this
  • Text this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Add to Book Bag Remove from Book Bag
  • Permanent link

Attacks based on malicious perturbations on image processing systems and defense methods against them

Systems implementing artifcial intelligence technologies have become widespread due to their effectiveness in solving various applied tasks including computer vision. Image processing through neural networks is also used in security-critical systems. At the same time, the use of artifcial intelligen...

Full description

Bibliographic Details
Published in:Научно-технический вестник информационных технологий, механики и оптики
Main Authors: D. A. Esipov, A. Y. Buchaev, A. Kerimbay, Y. V. Puzikova, S. K. Saidumarov, N. S. Sulimenko, I. Yu. Popov, N. S. Karmanovskiy
Format: Article
Language:English
Published: ITMO University 2024-12-01
Subjects:
искусственный интеллект
искусственная нейронная сеть
обработка изображений
состязательная атака
встраивание бэкдора
вредоносное возмущение
состязательное обучение
защитная дистилляция
сжатие параметров
сертификационная защита
предобработка данных
Online Access:https://ntv.elpub.ru/jour/article/view/202
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

https://ntv.elpub.ru/jour/article/view/202

Similar Items

  • An approach to detecting L0-optimized attacks on image processing neural networks via means of mathematical statistics
    by: D. А. Esipov
    Published: (2024-12-01)
  • Detection of L0-optimized attacks via anomaly scores distribution analysis
    by: D. A. Esipov, et al.
    Published: (2025-03-01)
  • A method for optimizing neural networks based on structural distillation using a genetic algorithm
    by: V. N. Kuzmin, et al.
    Published: (2024-12-01)
  • Искусственный интеллект в гематологии
    by: Александр Сергеевич Лучинин
    Published: (2022-01-01)
  • A method for protecting neural networks from computer backdoor attacks based on the trigger identification
    by: A. B. Menisov, et al.
    Published: (2024-12-01)

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs