observatory 发表于 2025-3-23 13:09:52

Principal Component Properties of Adversarial Samples,ns to the principal components of neural network inputs. We propose a new metric for neural networks to measure their robustness to adversarial samples, termed the (., .) point. We utilize this metric to achieve 93.36% accuracy in detecting adversarial samples independent of architecture and attack type for models trained on ImageNet.

售穴 发表于 2025-3-23 14:03:54

1865-0929 Systems, EDSMLS 2020, held in New York City, NY, USA, in February 2020. .The 7 full papers and 3 short papers were thoroughly reviewed and selected from 16 submissions. The volume presents original research on dependability and quality assurance of ML software systems, adversarial attacks on ML soft

jarring 发表于 2025-3-23 20:11:09

Communications in Computer and Information Sciencehttp://image.papertrans.cn/e/image/310749.jpg

Obliterate 发表于 2025-3-24 01:27:05

http://reply.papertrans.cn/32/3108/310749/310749_14.png

处理 发表于 2025-3-24 03:42:30

Neue Entwicklungen und Zukunftsperspektiven, to fool a model, but appear normal to human beings. Recent work has shown that pixel discretization can be used to make classifiers for MNIST highly robust to adversarial examples. However, pixel discretization fails to provide significant protection on more complex datasets. In this paper, we take

兵团 发表于 2025-3-24 06:54:01

https://doi.org/10.1007/978-3-322-86803-9wever, while poisoning attacks typically corrupt data in various ways including addition, omission and modification, to optimize the attack, we focus on omission only, which is much simpler to implement and analyze. A major advantage of our attack method is its generality. While poisoning attacks ar

清澈 发表于 2025-3-24 13:32:54

http://reply.papertrans.cn/32/3108/310749/310749_17.png

ascend 发表于 2025-3-24 15:07:32

http://reply.papertrans.cn/32/3108/310749/310749_18.png

endarterectomy 发表于 2025-3-24 19:46:14

http://reply.papertrans.cn/32/3108/310749/310749_19.png

Sputum 发表于 2025-3-25 00:54:01

http://reply.papertrans.cn/32/3108/310749/310749_20.png
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Engineering Dependable and Secure Machine Learning Systems; Third International Onn Shehory,Eitan Farchi,Guy Barash Conference proceedings