Detecting Adversarial Examples via Reconstruction-based Semantic Inconsistency
Abstract
References
Index Terms
- Detecting Adversarial Examples via Reconstruction-based Semantic Inconsistency
Recommendations
Adversarial Attacks and Detection on Reinforcement Learning-Based Interactive Recommender Systems
SIGIR '20: Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information RetrievalAdversarial attacks pose significant challenges for detecting adversarial attacks at an early stage. We propose attack-agnostic detection on reinforcement learning-based interactive recommendation systems. We first craft adversarial examples to show ...
Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
AbstractOver the last few years, the adoption of machine learning in a wide range of domains has been remarkable. Deep learning, in particular, has been extensively used to drive applications and services in specializations such as computer vision, ...
Highlights- A taxonomy of cybersecurity applications is established.
- Adversarial machine learning is systematically overviewed.
- An extensive, curated list of cybersecurity-related datasets is provided.
- Methods for generating adversarial ...
Robust Person Re-identification with Adversarial Examples Detection and Perturbation Extraction
Pattern Recognition and Computer VisionAbstractPerson re-identification (ReID) systems, those based on deep neural networks, have been shown their vulnerability to adversarial examples, i.e. images that only added slight perturbations. In previous defense methods, those input transformations ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
- the Natural Science Foundation of China
- the Natural Science Foundation of China
- Key Research and Development program of Anhui Province
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 266Total Downloads
- Downloads (Last 12 months)266
- Downloads (Last 6 weeks)49
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML FormatLogin options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in