Adversarial Examples: Attacks and Defenses for Deep Learning
[article]
Xiaoyong Yuan, Pan He, Qile Zhu, Xiaolin Li
<span title="2018-07-07">2018</span>
<i >
arXiv
</i>
<span class="release-stage" >pre-print</span>
Therefore, attacks and defenses on adversarial examples draw great attention. ...
In this paper, we review recent findings on adversarial examples for deep neural networks, summarize the methods for generating adversarial examples, and propose a taxonomy of these methods. ...
Adversarial commands can be generated by attackers against automatic speech recognition (ASR) models and Voice Controllable System (VCS) [23] , [24] such as Apple Siri [25] , Amazon Alexa [26] , and ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1712.07107v3">arXiv:1712.07107v3</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5wcz4h4eijdsdjeqwdpzbfbjeu">fatcat:5wcz4h4eijdsdjeqwdpzbfbjeu</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191023000222/https://arxiv.org/pdf/1712.07107v2.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<span style="color: #f43e3e;">✱</span>
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/51/74/51748ed3fc64c097ea1868507afa752390c792b6.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1712.07107v3" title="arxiv.org access">
<button class="ui compact blue labeled icon button serp-button">
<i class="file alternate outline icon"></i>
arxiv.org
</button>
</a>