Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
black-box attack
biblio
NMI-FGSM-Tri: An Efficient and Targeted Method for Generating Adversarial Examples for Speaker Recognition
Submitted by aekwall on Fri, 03/31/2023 - 8:36am
Neural networks
deep learning
pubcrawl
Metrics
Resiliency
composability
Black Box Attacks
black-box attack
adversarial examples
Design methodology
Cyberspace
data science
Target recognition
transferability
speaker recognition
biblio
Query-Efficient Target-Agnostic Black-Box Attack
Submitted by aekwall on Fri, 03/31/2023 - 8:35am
DNN
Transferability-based Attack
Target-agnostic Attack
Surrogate
Output Diversifying Sampling
MIMICs
meta-learning
DNN Security.
Closed box
Behavioral sciences
Neural networks
Complexity theory
Black Box Attacks
black-box attack
Knowledge engineering
composability
Resiliency
Metrics
pubcrawl
deep learning
biblio
Facial Privacy Preservation using FGSM and Universal Perturbation attacks
Submitted by grigby1 on Fri, 01/06/2023 - 3:11pm
AI
White-Box attack
Universal Perturbation
Privacy attributes
Fast Gradient Sign Method (FGSM)
Facial Privacy
Facial Aesthetic preservation
DeepFool algorithm
black-box attack
Human Factors
Adversarial Machine Learning
pubcrawl
parallel processing
face recognition
visualization
Prediction algorithms
Perturbation methods
data privacy
privacy
Scalability
Resiliency
resilience
biblio
Automatic Selection Attacks Framework for Hard Label Black-Box Models
Submitted by aekwall on Tue, 12/20/2022 - 4:21pm
Computational modeling
White Box Security
transferability
substitute model
machine learning
feature extraction
face recognition
estimation
deep learning
Conferences
Black Box Attacks
black-box attack
adversarial example
adversarial attack
Adaptation models
pubcrawl
Metrics
composability
Resiliency
biblio
Entropy-Based Modeling for Estimating Adversarial Bit-flip Attack Impact on Binarized Neural Network
Submitted by grigby1 on Fri, 11/18/2022 - 4:44pm
neural network resiliency
statistical model
Deep Neural Network accelerator
bit-flip attack
White-Box attack
black-box attack
image classification
Sensitivity
network topology
Topology
Resiliency
resilience
pubcrawl
Neural networks
security
machine learning
biblio
Generating Audio Adversarial Examples with Ensemble Substituted Models
Submitted by aekwall on Mon, 01/31/2022 - 3:12pm
Speech recognition
machine learning
Conferences
pubcrawl
Metrics
Resiliency
composability
automatic speech recognition
Stability analysis
genetic algorithm
black-box attack
White Box Security
biblio
A Practical Black-Box Attack Against Autonomous Speech Recognition Model
Submitted by aekwall on Tue, 07/27/2021 - 12:57pm
Black Box Attacks
Global communication
differential evolution
black-box attack
automatic speech recognition
composability
Resiliency
Metrics
pubcrawl
Conferences
machine learning algorithms
machine learning
Training
Data models
security
biblio
Black-box Attacks on DNN Classifier Based on Fuzzy Adversarial Examples
Submitted by grigby1 on Thu, 05/20/2021 - 10:53am
fuzzy adversarial examples
white box cryptography
Training
security
resilience
pubcrawl
Knowledge engineering
Image Processing
generative adversarial networks
Black Box Attacks
functionally equivalent network
Entropy
deep learning
black-box attack
Resiliency
Metrics
composability
biblio
Evading Deepfake-Image Detectors with White- and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 1:35pm
security of data
neural nets
neural network
optimization
Perturbation methods
popular forensic approach
pubcrawl
resilience
Resiliency
Robustness
Metrics
significant vulnerabilities
social networking (online)
state- of-the-art classifier
synthesizer
synthetic content
synthetically-generated content
target classifier
Training
Twitter
fraudulent social media profiles
white box
security
attack case studies
AUC
black-box attack
composability
deepfake-image detectors
disinformation campaigns
Forensics
White Box Security
Generators
image area
image classification
Image forensics
image generators
image representation
image sensors
image-forensic classifiers
learning (artificial intelligence)
biblio
Fooling A Deep-Learning Based Gait Behavioral Biometric System
Submitted by grigby1 on Thu, 03/04/2021 - 1:34pm
Metrics
FGSM
FGSM iterations
gait behavioral biometrics
gradient methods
LSTM
machine learning algorithms
machine learning model
mature techniques
fast gradient sign method
privacy
pubcrawl
resilience
Resiliency
shadow model
Training
user behavioral information
white-box attacks
black-box attack
white box
security
adversarial learning attacks
Adversarial Machine Learning
authentication
authorisation
Biological system modeling
biometrics (access control)
White Box Security
Classification algorithms
composability
counter spoofing threats
deep learning (artificial intelligence)
Deep-learning
deep-learning based gait behavioral biometric system
end-user devices
extent FGSM
1
2
next ›
last »