Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks

被引:0
|
作者
Nowroozi, Ehsan [1 ]
Ghelichkhani, Samaneh [2 ]
Haider, Imran [3 ]
Dehghantanha, Ali [4 ]
机构
[1] Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, United Kingdom
[2] University of Leeds, Faculty of Engineering and Physical Sciences Master (Computing), Master in Advanced Computer Science, United Kingdom
[3] Department of Natural Engineering and Sciences, Bahcesehir University (BAU), Istanbul, Turkey
[4] Cyber Science Lab, Canada Cyber Foundry, University of Guelph, Canada
来源
arXiv | 2023年
关键词
Computer networks - Convolutional neural networks - Deep neural networks - Gradient methods - Learning algorithms - Natural language processing systems - Network security;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Siamese Networks and Adversarial Attacks: An Overview
    Shaw, Laxmi
    Hebli, Pavan P.
    Ekin, Tahir
    2024 IEEE INTERNATIONAL CONFERENCE ON PROGNOSTICS AND HEALTH MANAGEMENT, ICPHM 2024, 2024, : 377 - 384
  • [32] The Adversarial Attacks Threats on Computer Vision: A Survey
    Zhou, Yiyun
    Han, Meng
    Liu, Liyuan
    He, Jing
    Gao, Xi
    2019 IEEE 16TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS WORKSHOPS (MASSW 2019), 2019, : 25 - 30
  • [33] Improving the Transferability of Adversarial Attacks on Face Recognition With Beneficial Perturbation Feature Augmentation
    Zhou, Fengfan
    Ling, Hefei
    Shi, Yuxuan
    Chen, Jiazhong
    Li, Zongyi
    Li, Ping
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 11 (06) : 1 - 13
  • [34] Probability-Distribution-Guided Adversarial Sample Attacks for Boosting Transferability and Interpretability
    Li, Hongying
    Yu, Miaomiao
    Li, Xiaofei
    Zhang, Jun
    Li, Shuohao
    Lei, Jun
    Huang, Hairong
    MATHEMATICS, 2023, 11 (13)
  • [35] Improving the Transferability of Adversarial Attacks Through Both Front and Rear Vector Method
    Wu, Hao
    Wang, Jinwei
    Zhang, Jiawei
    Luo, Xiangyang
    Ma, Bin
    DIGITAL FORENSICS AND WATERMARKING, IWDW 2022, 2023, 13825 : 83 - 97
  • [36] Constraining Adversarial Attacks on Network Intrusion Detection Systems: Transferability and Defense Analysis
    Alhussien, Nour
    Aleroud, Ahmed
    Melhem, Abdullah
    Khamaiseh, Samer Y.
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (03): : 2751 - 2772
  • [37] Improving transferability of adversarial examples via statistical attribution-based attacks
    Zhu, Hegui
    Jia, Yanmeng
    Yan, Yue
    Yang, Ze
    NEURAL NETWORKS, 2025, 187
  • [38] Improving transferability of 3D adversarial attacks with scale and shear transformations
    Zhang, Jinlai
    Dong, Yinpeng
    Zhu, Jun
    Zhu, Jihong
    Kuang, Minchi
    Yuan, Xiaming
    INFORMATION SCIENCES, 2024, 662
  • [39] Boosting Adversarial Transferability via Relative Feature Importance-Aware Attacks
    Li, Jian-Wei
    Shao, Wen-Ze
    Sun, Yu-Bao
    Wang, Li-Qian
    Ge, Qi
    Xiao, Liang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 3489 - 3504
  • [40] Cross-Representation Transferability of Adversarial Attacks: From Spectrograms to Audio Waveforms
    Koerich, Karl Michel
    Esmaeilpour, Mohammad
    Abdoli, Sajjad
    Britto Jr, Alceu de S.
    Koerich, Alessandro L.
    2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020,