Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Black Box Attacks
biblio
Can You Spot the Chameleon? Adversarially Camouflaging Images from Co-Salient Object Detection
Submitted by aekwall on Fri, 03/31/2023 - 8:36am
Robustness
Perturbation methods
pubcrawl
Metrics
Resiliency
composability
Black Box Attacks
Safety
Pipelines
object detection
Additives
Degradation
Adversarial attack and defense
Low-level vision
biblio
Adversarial Audio Detection Method Based on Transformer
Submitted by aekwall on Fri, 03/31/2023 - 8:36am
security
Speech recognition
feature extraction
pubcrawl
Metrics
Resiliency
composability
machine learning
Noise measurement
Black Box Attacks
modeling
Transformers
adversarial detection
Position Encoding
Self-Attention
biblio
SAT: Integrated Multi-agent Blackbox Security Assessment Tool using Machine Learning
Submitted by aekwall on Fri, 03/31/2023 - 8:36am
documentation
Web Vulnera-bility Scanner
web security
web applications
security testing
pentesting
OWASP
DVWA
Mobile Security
application security
security
Prototypes
Black Box Attacks
machine learning
composability
Resiliency
Metrics
pubcrawl
information security
biblio
NMI-FGSM-Tri: An Efficient and Targeted Method for Generating Adversarial Examples for Speaker Recognition
Submitted by aekwall on Fri, 03/31/2023 - 8:36am
Neural networks
deep learning
pubcrawl
Metrics
Resiliency
composability
Black Box Attacks
black-box attack
adversarial examples
Design methodology
Cyberspace
data science
Target recognition
transferability
speaker recognition
biblio
Query-Efficient Target-Agnostic Black-Box Attack
Submitted by aekwall on Fri, 03/31/2023 - 8:35am
DNN
Transferability-based Attack
Target-agnostic Attack
Surrogate
Output Diversifying Sampling
MIMICs
meta-learning
DNN Security.
Closed box
Behavioral sciences
Neural networks
Complexity theory
Black Box Attacks
black-box attack
Knowledge engineering
composability
Resiliency
Metrics
pubcrawl
deep learning
biblio
Label-Only Model Inversion Attacks via Boundary Repulsion
Submitted by aekwall on Fri, 03/31/2023 - 8:35am
Semantics
privacy and ethics in vision
fairness
ethics
Adversarial attack and defense
accountability
transparency
Training data
Black Box Attacks
Neural networks
composability
Resiliency
Metrics
pubcrawl
face recognition
Predictive models
computer architecture
biblio
Adversarial Eigen Attack on BlackBox Models
Submitted by aekwall on Fri, 03/31/2023 - 8:35am
Adversarial attack and defense
Black Box Attacks
composability
Computational modeling
computer vision
Data models
deep learning
Jacobian matrices
machine learning
Metrics
Optimization methods
Perturbation methods
pubcrawl
Resiliency
Training data
biblio
Towards Efficient Data Free Blackbox Adversarial Attack
Submitted by aekwall on Fri, 03/31/2023 - 8:35am
Computational modeling
Data models
data privacy
pubcrawl
Metrics
Resiliency
composability
machine learning
Black Box Attacks
Training data
generative adversarial networks
computer vision
Adversarial attack and defense
biblio
Catch Me If You Can: Blackbox Adversarial Attacks on Automatic Speech Recognition using Frequency Masking
Submitted by aekwall on Fri, 03/31/2023 - 8:34am
Measurement
Perturbation methods
pubcrawl
Metrics
Resiliency
composability
automatic speech recognition
Black Box Attacks
adversarial attack
navigation
Target recognition
Closed box
Blackbox
Frequency Masking
Psychoacoustic models
Psychoacoustics
biblio
Automatic Selection Attacks Framework for Hard Label Black-Box Models
Submitted by aekwall on Tue, 12/20/2022 - 4:21pm
Computational modeling
White Box Security
transferability
substitute model
machine learning
feature extraction
face recognition
estimation
deep learning
Conferences
Black Box Attacks
black-box attack
adversarial example
adversarial attack
Adaptation models
pubcrawl
Metrics
composability
Resiliency
1
2
next ›
last »