Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks

被引:0
|
作者
Nowroozi, Ehsan [1 ]
Ghelichkhani, Samaneh [2 ]
Haider, Imran [3 ]
Dehghantanha, Ali [4 ]
机构
[1] Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, United Kingdom
[2] University of Leeds, Faculty of Engineering and Physical Sciences Master (Computing), Master in Advanced Computer Science, United Kingdom
[3] Department of Natural Engineering and Sciences, Bahcesehir University (BAU), Istanbul, Turkey
[4] Cyber Science Lab, Canada Cyber Foundry, University of Guelph, Canada
来源
arXiv | 2023年
关键词
Computer networks - Convolutional neural networks - Deep neural networks - Gradient methods - Learning algorithms - Natural language processing systems - Network security;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Black-box Attacks on Spoofing Countermeasures Using Transferability of Adversarial Examples
    Zhang, Yuekai
    Jiang, Ziyan
    Villalba, Jesus
    Dehak, Najim
    INTERSPEECH 2020, 2020, : 4238 - 4242
  • [42] Improving the transferability of adversarial examples through black-box feature attacks
    Wang, Maoyuan
    Wang, Jinwei
    Ma, Bin
    Luo, Xiangyang
    NEUROCOMPUTING, 2024, 595
  • [43] Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability
    Tarchoun, Bilel
    Alouani, Ihsen
    Ben Khalifa, Anouar
    Mahjoub, Mohamed Ali
    2021 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW 2021), 2021, : 299 - 302
  • [44] Transfer adversarial attacks across industrial intelligent systems
    Yin, Zhenqin
    Zhuo, Yue
    Ge, Zhiqiang
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2023, 237
  • [45] Adversarial Attacks on Neural Networks for Graph Data
    Zuegner, Daniel
    Akbarnejad, Amir
    Guennemann, Stephan
    PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 6246 - 6250
  • [46] Exploratory Adversarial Attacks on Graph Neural Networks
    Lin, Xixun
    Zhou, Chuan
    Yang, Hong
    Wu, Jia
    Wang, Haibo
    Cao, Yanan
    Wang, Bin
    20TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2020), 2020, : 1136 - 1141
  • [47] Detecting Adversarial Attacks in the Context of Bayesian Networks
    Alsuwat, Emad
    Alsuwat, Hatim
    Rose, John
    Valtorta, Marco
    Farkas, Csilla
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIII, 2019, 11559 : 3 - 22
  • [48] Adversarial Attacks on Clustering Coefficient in Complex Networks
    Zhou, Bo
    Yan, Xiudi
    Lv, Yuqian
    Xuan, Qi
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (04) : 2199 - 2203
  • [49] Adversarial Attacks on Neural Networks for Graph Data
    Zuegner, Daniel
    Akbarnejad, Amir
    Guennemann, Stephan
    KDD'18: PROCEEDINGS OF THE 24TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2018, : 2847 - 2856
  • [50] On the Robustness of Bayesian Neural Networks to Adversarial Attacks
    Bortolussi, Luca
    Carbone, Ginevra
    Laurenti, Luca
    Patane, Andrea
    Sanguinetti, Guido
    Wicker, Matthew
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, : 1 - 14