Filters








329 Hits in 7.2 sec

Intelligent Autonomous Things on the Battlefield [article]

Alexander Kott, Ethan Stump
<span title="2019-02-26">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Numerous, artificially intelligent, networked things will populate the battlefield of the future, operating in close collaboration with human warfighters, and fighting as teams in highly adversarial environments  ...  The IOBT will experience unique challenges that are not yet well addressed by the current generation of AI and machine learning.  ...  Also, it is used only in military environments, where most of the usual concerns are irrelevant.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1902.10086v1">arXiv:1902.10086v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uxdjhtr2jnemfcmuoputig273y">fatcat:uxdjhtr2jnemfcmuoputig273y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191012120732/https://arxiv.org/pdf/1902.10086v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/48/bc/48bc7b3eaf7fb374113c21c92ea8644ac471d43c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1902.10086v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Advances in adversarial attacks and defenses in computer vision: A survey [article]

Naveed Akhtar, Ajmal Mian, Navid Kardan, Mubarak Shah
<span title="2021-09-02">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Many of those contributions have inspired new directions in this area, which has matured significantly since witnessing the first generation methods.  ...  In [2], we reviewed the contributions made by the computer vision community in adversarial attacks on deep learning (and their defenses) until the advent of year 2018.  ...  An adversarial pattern computed by their technique serves as a camouflage to evade detectors in their work.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2108.00401v2">arXiv:2108.00401v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/23gw74oj6bblnpbpeacpg3hq5y">fatcat:23gw74oj6bblnpbpeacpg3hq5y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210906192640/https://arxiv.org/pdf/2108.00401v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1a/08/1a0829a7bef8ea3ecb33b55871b4498dd328ff68.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2108.00401v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Adversarial Texture for Fooling Person Detectors in the Physical World [article]

Zhanhao Hu, Siyuan Huang, Xiaopei Zhu, Xiaolin Hu, Fuchun Sun, Bo Zhang
<span title="2022-03-18">2022</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
However, the AI system can make mistakes when receiving deliberately designed patterns in the real world, i.e., physical adversarial examples.  ...  We propose a generative method, named Toroidal-Cropping-based Expandable Generative Attack (TC-EGA), to craft AdvTexture with repetitive structures.  ...  Acknowledgement This work was supported in part by the National Natural Science Foundation of China (Nos. U19B2034, 62061136001, 61836014) and the Tsinghua-Toyota Joint Research Fund.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2203.03373v3">arXiv:2203.03373v3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/brnxzsvdt5aarlufpmbyzz35ee">fatcat:brnxzsvdt5aarlufpmbyzz35ee</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220515112821/https://arxiv.org/pdf/2203.03373v3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f2/3b/f23b20473ecbc2920630e571f761c4167b191a07.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2203.03373v3" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A Review of anomaly detection techniques in advanced metering infrastructure

Abbas M. Al-Ghaili, Zul- Azri Ibrahim, Syazwani Arissa Shah Hairi, Fiza Abdul Rahim, Hasventhran Baskaran, Noor Afiza Mohd Ariffin, Hairoladenan Kasim
<span title="2021-02-01">2021</span> <i title="Institute of Advanced Engineering and Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/mwj5yys4mnek7al64kpw5psjqi" style="color: black;">Bulletin of Electrical Engineering and Informatics</a> </i> &nbsp;
A huge amount of data generated in AMI allows attackers to manipulate the consumer energy consumption to their benefit once they manage to hack into the AMI environment.  ...  One of the main elements of AMI is a smart meter that used to manage electricity generation and distribution to end-user.  ...  environment.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11591/eei.v10i1.2026">doi:10.11591/eei.v10i1.2026</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tc7cp5t4rva65jrelqbzjnqnmu">fatcat:tc7cp5t4rva65jrelqbzjnqnmu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210428050528/https://beei.org/index.php/EEI/article/download/2026/1900" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/33/80/33800c9b9eae7a2dc01a40f3feb4fc46eab6216f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11591/eei.v10i1.2026"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters

Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg
<span title="2020-04-20">2020</span> <i title="Zenodo"> Zenodo </i> &nbsp;
We delineate Adversarial Genetic Programming for Cyber Security, a research topic that, by means of genetic programming (GP), replicates and studies the behavior of cyber adversaries and the dynamics of  ...  Cyber security adversaries and engagements are ubiquitous and ceaseless.  ...  Either expressed or implied of Applied Communication Services, or the US Government.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.4593284">doi:10.5281/zenodo.4593284</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mpwyc4xbhbhahlaagf44a22abe">fatcat:mpwyc4xbhbhahlaagf44a22abe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210315124113/https://zenodo.org/record/4593285/files/gp_that_matters_adversarial_sec.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/80/99/8099ae9e104506c648eef7d373f2d815df2cef07.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.4593284"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Adversarial genetic programming for cyber security: a rising application domain where GP matters

Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg
<span title="2020-04-02">2020</span> <i title="Springer Science and Business Media LLC"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kaqfiyu23jaedmsqlirt7rbdxq" style="color: black;">Genetic Programming and Evolvable Machines</a> </i> &nbsp;
We delineate Adversarial Genetic Programming for Cyber Security, a research topic that, by means of genetic programming (GP), replicates and studies the behavior of cyber adversaries and the dynamics of  ...  Cyber security adversaries and engagements are ubiquitous and ceaseless.  ...  Either expressed or implied of Applied Communication Services, or the US Government.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10710-020-09389-y">doi:10.1007/s10710-020-09389-y</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pptcxqfc6zeptdstzl3ipewrym">fatcat:pptcxqfc6zeptdstzl3ipewrym</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200411005222/https://arxiv.org/pdf/2004.04647v1.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10710-020-09389-y"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Adding Robustness to Support Vector Machines Against Adversarial Reverse Engineering

Ibrahim M. Alabdulmohsin, Xin Gao, Xiangliang Zhang
<span title="">2014</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6g37zvjwwrhv3dizi6ffue642m" style="color: black;">Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management - CIKM &#39;14</a> </i> &nbsp;
In other words, the conventional approach of using a fixed classifier in adversarial environments is generally Pareto suboptimal.  ...  Under such adversarial environments, adversaries can generate exploratory attacks against the defender such as evasion and reverse engineering.  ...  One such attack is red-herring, in which irrelevant patterns are consistently added into worms during training so that the classifier focuses on such irrelevant patterns and ignores the real signatures  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2661829.2662047">doi:10.1145/2661829.2662047</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/cikm/AlabdulmohsinGZ14.html">dblp:conf/cikm/AlabdulmohsinGZ14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qpqg6oddvrdh5hxdrvjl66c67m">fatcat:qpqg6oddvrdh5hxdrvjl66c67m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808234543/https://mine.kaust.edu.sa/Documents/papers/CIKM2014.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fa/62/fa62fbe22a003ce0724bfc0f1c9d2ed2596528b2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2661829.2662047"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

A Survey on Adversarial Attacks for Malware Analysis [article]

Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam
<span title="2022-01-05">2022</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Work will provide a taxonomy of adversarial evasion attacks on the basis of attack domain and adversarial generation techniques.  ...  The paper will introduce various machine learning techniques used to generate adversarial and explain the structure of target files.  ...  Digital signature patterns can be extracted easily by attacker and implemented to confuse the signature of malware.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2111.08223v2">arXiv:2111.08223v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fiw3pgunsvb2vo7uv72mp6b65a">fatcat:fiw3pgunsvb2vo7uv72mp6b65a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211127201928/https://arxiv.org/pdf/2111.08223v1.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/55/c2/55c26a51ab9e0ec95edc216fce8c0a6d919c7351.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2111.08223v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

On Disentangling Spoof Trace for Generic Face Anti-Spoofing [article]

Yaojie Liu, Joel Stehouwer, Xiaoming Liu
<span title="2020-07-17">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
This work designs a novel adversarial learning framework to disentangle the spoof traces from input faces as a hierarchical combination of patterns at multiple scales.  ...  Designing a generic anti-spoofing model to estimate those spoof traces can improve not only the generalization of the spoof detection, but also the interpretability of the model's decision.  ...  The discriminators are supervised with adversarial loss L D to compete with the generator.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2007.09273v1">arXiv:2007.09273v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ep25wv3jxfgc5fs5fa2lm3b7my">fatcat:ep25wv3jxfgc5fs5fa2lm3b7my</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200828055009/https://arxiv.org/pdf/2007.09273v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bd/03/bd03c79e2c90d5c7601fc382a7445687037ad88a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2007.09273v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things

<span title="2017-09-08">2017</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ikdpfme5h5egvnwtvvtjrnntyy" style="color: black;">Electronics</a> </i> &nbsp;
In this review article for Internet of Things (IoT) applications, important low-power design techniques for digital and mixed-signal analog-digital converter (ADC) circuits are presented.  ...  Key Low Power Techniques in Digital, Analog, and Mixed-Signal Circuits Digital Circuits Scaling of CMOS devices have continued for many decades to provide faster switching speed and lower power consumption  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/electronics6030067">doi:10.3390/electronics6030067</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ozssarlb2ng5pcdsupo2hljyna">fatcat:ozssarlb2ng5pcdsupo2hljyna</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180728003406/https://res.mdpi.com/def50200a582619c4b40b26d74cfca9a6c32c9faed780e07c038e3a8dfb25da4e88f491bbac77a380dc67b8be7973d16b59e668152e143015faa1bc88da0d4037e03e3593cfe70f89bc323f37ae472af31cd6c25790d2aa77c6182afc7ecf284496ac1ce7d46e52f9d31a7457e853de9168c2825e7a2d5b928cc9176e1fd68ef3e566c954046c589de495a0b1fb19f2a71ff63a2fc2c3ba435745170c15920?filename=&amp;attachment=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/77/bf/77bff3f5811cb069495f1f6f52f2e8f50f978151.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/electronics6030067"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin [article]

Tianming Zheng, Ming Liu, Deepak Puthal, Ping Yi, Yue Wu, Xiangjian He
<span title="2022-05-24">2022</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The development towards an intelligent, digital, and Internetconnected smart grid has attracted external adversaries for malicious activities.  ...  As an emerging technology, digital twin (DT) is considered as an enabler for enhanced security. However, the practical implementation is quite challenging.  ...  ACKNOWLEDGMENT We appreciate the support of the National Key R&D Program of China under Grants No. 2020YFB1807500, No. 2020YFB1807504, and National Science Foundation of China Key Project under Grants  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2205.11783v1">arXiv:2205.11783v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fz43u2e6g5gyfepqz44tezelba">fatcat:fz43u2e6g5gyfepqz44tezelba</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220529215441/https://arxiv.org/pdf/2205.11783v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e7/8a/e78a270bca07ee3fe0923a98a9e0fdf9a7a092e1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2205.11783v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Engineering Privacy in Public: Confounding Face Recognition [chapter]

James Alexander, Jonathan Smith
<span title="">2003</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
This paper is a status report for a research program designed to achieve this objective within a larger goal of similarly defeating all HID technologies.  ...  The objective of DARPA's Human ID at a Distance (HID) program "is to develop automated biometric identification technologies to detect, recognize and identify humans at great distances."  ...  Portions of the research in this paper use the FERET database of facial images collected under the FERET program [23] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-40956-4_7">doi:10.1007/978-3-540-40956-4_7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jfokwmtuhrazrptueufvje2w6i">fatcat:jfokwmtuhrazrptueufvje2w6i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060625115538/http://www.cis.upenn.edu:80/~jalex/papers/pet2003.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0c/85/0c85d1b384bb6e2d5d6e4db5461a7101ceed6808.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-40956-4_7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Adversarial Examples in Modern Machine Learning: A Review [article]

Rey Reza Wiyatno, Anqi Xu, Ousmane Dia, Archy de Berker
<span title="2019-11-15">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We explore a variety of adversarial attack methods that apply to image-space content, real world adversarial attacks, adversarial defenses, and the transferability property of adversarial examples.  ...  We also discuss strengths and weaknesses of various methods of adversarial attack and defense.  ...  In every iteration, the adversarial camouflage texture c is added to a set of camouflage pattern used to train the substitute network.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1911.05268v2">arXiv:1911.05268v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/majzak4sqbhcpeahghh6sm3dwq">fatcat:majzak4sqbhcpeahghh6sm3dwq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200825161652/https://arxiv.org/pdf/1911.05268v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7f/1e/7f1e602a44b56b9853fcc2063df9593e7b79ba22.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1911.05268v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Kaleidoscopic Approach to Security Shadows in the Age of Information

Deyan Gotchev
<span title="">2000</span> <i title="Procon, Ltd."> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/tvg6uqc2trf33c7i7fjhmumtru" style="color: black;">Information &amp; Security An International Journal</a> </i> &nbsp;
General deterrence stems from maintaining the capability and will to inflict severe damage in retaliation against adversaries.  ...  This means that most spacerelated laws of all previous functional spaces would not apply to "digital" systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11610/isij.0401">doi:10.11610/isij.0401</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4xpafxxtojccdighzhgxieyute">fatcat:4xpafxxtojccdighzhgxieyute</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721140345/http://procon.bg/system/files/04.01_Gotchev.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5f/b1/5fb13712e3e8f41629709fb203fafcc1137d8b69.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11610/isij.0401"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture. Release 2.0 [article]

Alexander Kott, Paul Théron, Martin Drašar, Edlira Dushku, Benoît LeBlanc, Paul Losiewicz, Alessandro Guarino, Luigi Mancini, Agostino Panico, Mauno Pihelgas, Krzysztof Rzadca
<span title="2019-09-18">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In a conflict with a technically sophisticated adversary, NATO military tactical networks will operate in a heavily contested battlefield.  ...  We describe the rationale of the AICA concept, explain the methodology and purpose that drive the definition of the AICA Reference Architecture, and review some of the main features and challenges of AICAs  ...  We can use a dedicated virtual machine for each deception environment, to minimize the interference from other irrelevant workloads.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1803.10664v2">arXiv:1803.10664v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gtkwxl2gezcn7hbdtldxh77zai">fatcat:gtkwxl2gezcn7hbdtldxh77zai</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200925125901/https://arxiv.org/ftp/arxiv/papers/1803/1803.10664.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/97/f6/97f6d67b9b483f67381b7346fbf23bf86af2ca86.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1803.10664v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 329 results