Journal articles on the topic 'Fast Gradient Sign Method (FGSM)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Fast Gradient Sign Method (FGSM).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hong, Dian, Deng Chen, Yanduo Zhang, Huabing Zhou, and Liang Xie. "Attacking Robot Vision Models Efficiently Based on Improved Fast Gradient Sign Method." Applied Sciences 14, no. 3 (February 2, 2024): 1257. http://dx.doi.org/10.3390/app14031257.
Full textLong, Sheng, Wei Tao, Shuohao LI, Jun Lei, and Jun Zhang. "On the Convergence of an Adaptive Momentum Method for Adversarial Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 13 (March 24, 2024): 14132–40. http://dx.doi.org/10.1609/aaai.v38i13.29323.
Full textPan, Chao, Qing Li, and Xin Yao. "Adversarial Initialization with Universal Adversarial Perturbation: A New Approach to Fast Adversarial Training." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 19 (March 24, 2024): 21501–9. http://dx.doi.org/10.1609/aaai.v38i19.30147.
Full textWibawa, Sigit. "Analysis of Adversarial Attacks on AI-based With Fast Gradient Sign Method." International Journal of Engineering Continuity 2, no. 2 (August 1, 2023): 72–79. http://dx.doi.org/10.58291/ijec.v2i2.120.
Full textKadhim, Ansam, and Salah Al-Darraji. "Face Recognition System Against Adversarial Attack Using Convolutional Neural Network." Iraqi Journal for Electrical and Electronic Engineering 18, no. 1 (November 6, 2021): 1–8. http://dx.doi.org/10.37917/ijeee.18.1.1.
Full textPervin, Mst Tasnim, Linmi Tao, and Aminul Huq. "Adversarial attack driven data augmentation for medical images." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 6 (December 1, 2023): 6285. http://dx.doi.org/10.11591/ijece.v13i6.pp6285-6292.
Full textVillegas-Ch, William, Angel Jaramillo-Alcázar, and Sergio Luján-Mora. "Evaluating the Robustness of Deep Learning Models against Adversarial Attacks: An Analysis with FGSM, PGD and CW." Big Data and Cognitive Computing 8, no. 1 (January 16, 2024): 8. http://dx.doi.org/10.3390/bdcc8010008.
Full textKurniawan S, Putu Widiarsa, Yosi Kristian, and Joan Santoso. "Pemanfaatan Deep Convulutional Auto-encoder untuk Mitigasi Serangan Adversarial Attack pada Citra Digital." J-INTECH 11, no. 1 (July 4, 2023): 50–59. http://dx.doi.org/10.32664/j-intech.v11i1.845.
Full textKumari, Rekha, Tushar Bhatia, Peeyush Kumar Singh, and Kanishk Vikram Singh. "Dissecting Adversarial Attacks: A Comparative Analysis of Adversarial Perturbation Effects on Pre-Trained Deep Learning Models." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 11 (November 1, 2023): 1–11. http://dx.doi.org/10.55041/ijsrem27337.
Full textPal, Biprodip, Debashis Gupta, Md Rashed-Al-Mahfuz, Salem A. Alyami, and Mohammad Ali Moni. "Vulnerability in Deep Transfer Learning Models to Adversarial Fast Gradient Sign Attack for COVID-19 Prediction from Chest Radiography Images." Applied Sciences 11, no. 9 (May 7, 2021): 4233. http://dx.doi.org/10.3390/app11094233.
Full textKim, Hoki, Woojin Lee, and Jaewook Lee. "Understanding Catastrophic Overfitting in Single-step Adversarial Training." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 9 (May 18, 2021): 8119–27. http://dx.doi.org/10.1609/aaai.v35i9.16989.
Full textLu, Fan. "Adversarial attack against deep learning algorithms for gun category detection." Applied and Computational Engineering 53, no. 1 (March 28, 2024): 190–96. http://dx.doi.org/10.54254/2755-2721/53/20241368.
Full textCui, Chenrui. "Adversarial attack study on VGG16 for cat and dog image classification task." Applied and Computational Engineering 50, no. 1 (March 25, 2024): 170–75. http://dx.doi.org/10.54254/2755-2721/50/20241438.
Full textMohamed, Mahmoud, and Mohamed Bilal. "Comparing the Performance of Deep Denoising Sparse Autoencoder with Other Defense Methods Against Adversarial Attacks for Arabic letters." Jordan Journal of Electrical Engineering 10, no. 1 (2024): 122. http://dx.doi.org/10.5455/jjee.204-1687363297.
Full textNavjot Kaur. "Robustness and Security in Deep Learning: Adversarial Attacks and Countermeasures." Journal of Electrical Systems 20, no. 3s (April 4, 2024): 1250–57. http://dx.doi.org/10.52783/jes.1436.
Full textZhang, Qikun, Yuzhi Zhang, Yanling Shao, Mengqi Liu, Jianyong Li, Junling Yuan, and Ruifang Wang. "Boosting Adversarial Attacks with Nadam Optimizer." Electronics 12, no. 6 (March 20, 2023): 1464. http://dx.doi.org/10.3390/electronics12061464.
Full textYang, Bo, Kaiyong Xu, Hengjun Wang, and Hengwei Zhang. "Random Transformation of image brightness for adversarial attack." Journal of Intelligent & Fuzzy Systems 42, no. 3 (February 2, 2022): 1693–704. http://dx.doi.org/10.3233/jifs-211157.
Full textVyas, Dhairya, and Viral V. Kapadia. "Designing defensive techniques to handle adversarial attack on deep learning based model." PeerJ Computer Science 10 (March 8, 2024): e1868. http://dx.doi.org/10.7717/peerj-cs.1868.
Full textZou, Junhua, Yexin Duan, Boyu Li, Wu Zhang, Yu Pan, and Zhisong Pan. "Making Adversarial Examples More Transferable and Indistinguishable." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 3 (June 28, 2022): 3662–70. http://dx.doi.org/10.1609/aaai.v36i3.20279.
Full textUtomo, Sapdo, Adarsh Rouniyar, Hsiu-Chun Hsu, and Pao-Ann Hsiung. "Federated Adversarial Training Strategies for Achieving Privacy and Security in Sustainable Smart City Applications." Future Internet 15, no. 11 (November 20, 2023): 371. http://dx.doi.org/10.3390/fi15110371.
Full textHan, Dong, Reza Babaei, Shangqing Zhao, and Samuel Cheng. "Exploring the Efficacy of Learning Techniques in Model Extraction Attacks on Image Classifiers: A Comparative Study." Applied Sciences 14, no. 9 (April 29, 2024): 3785. http://dx.doi.org/10.3390/app14093785.
Full textTrinh Quang Kien. "Improving the robustness of binarized neural network using the EFAT method." Journal of Military Science and Technology, CSCE5 (December 15, 2021): 14–23. http://dx.doi.org/10.54939/1859-1043.j.mst.csce5.2021.14-23.
Full textRudd-Orthner, Richard N. M., and Lyudmila Mihaylova. "Deep ConvNet: Non-Random Weight Initialization for Repeatable Determinism, Examined with FSGM." Sensors 21, no. 14 (July 13, 2021): 4772. http://dx.doi.org/10.3390/s21144772.
Full textXu, Wei, and Veerawat Sirivesmas. "Study on Network Virtual Printing Sculpture Design using Artificial Intelligence." International Journal of Communication Networks and Information Security (IJCNIS) 15, no. 1 (May 30, 2023): 132–45. http://dx.doi.org/10.17762/ijcnis.v15i1.5694.
Full textGuan, Dejian, and Wentao Zhao . "Adversarial Detection Based on Inner-Class Adjusted Cosine Similarity." Applied Sciences 12, no. 19 (September 20, 2022): 9406. http://dx.doi.org/10.3390/app12199406.
Full textZhao, Weimin, Sanaa Alwidian, and Qusay H. Mahmoud. "Adversarial Training Methods for Deep Learning: A Systematic Review." Algorithms 15, no. 8 (August 12, 2022): 283. http://dx.doi.org/10.3390/a15080283.
Full textLi, Xinyu, Shaogang Dai, and Zhijin Zhao. "Unsupervised Learning-Based Spectrum Sensing Algorithm with Defending Adversarial Attacks." Applied Sciences 13, no. 16 (August 9, 2023): 9101. http://dx.doi.org/10.3390/app13169101.
Full textZhu, Min-Ling, Liang-Liang Zhao, and Li Xiao. "Image Denoising Based on GAN with Optimization Algorithm." Electronics 11, no. 15 (August 5, 2022): 2445. http://dx.doi.org/10.3390/electronics11152445.
Full textLee , Jungeun, and Hoeseok Yang . "Performance Improvement of Image-Reconstruction-Based Defense against Adversarial Attack." Electronics 11, no. 15 (July 28, 2022): 2372. http://dx.doi.org/10.3390/electronics11152372.
Full textWu, Fei, Wenxue Yang, Limin Xiao, and Jinbin Zhu. "Adaptive Wiener Filter and Natural Noise to Eliminate Adversarial Perturbation." Electronics 9, no. 10 (October 3, 2020): 1634. http://dx.doi.org/10.3390/electronics9101634.
Full textBhandari, Mohan, Tej Bahadur Shahi, and Arjun Neupane. "Evaluating Retinal Disease Diagnosis with an Interpretable Lightweight CNN Model Resistant to Adversarial Attacks." Journal of Imaging 9, no. 10 (October 11, 2023): 219. http://dx.doi.org/10.3390/jimaging9100219.
Full textSu, Guanpeng. "Analysis of the attack effect of adversarial attacks on machine learning models." Applied and Computational Engineering 6, no. 1 (June 14, 2023): 1212–18. http://dx.doi.org/10.54254/2755-2721/6/20230607.
Full textHuang, Bowen, Ruoheng Feng, and Jiahao Yuan. "Exploiting ensembled neural network model for social platform rumor detection." Applied and Computational Engineering 20, no. 1 (October 23, 2023): 231–39. http://dx.doi.org/10.54254/2755-2721/20/20231103.
Full textKwon, Hyun. "MedicalGuard: U-Net Model Robust against Adversarially Perturbed Images." Security and Communication Networks 2021 (August 9, 2021): 1–8. http://dx.doi.org/10.1155/2021/5595026.
Full textHaroon, Muhammad Shahzad, and Husnain Mansoor Ali. "Ensemble adversarial training based defense against adversarial attacks for machine learning-based intrusion detection system." Neural Network World 33, no. 5 (2023): 317–36. http://dx.doi.org/10.14311/nnw.2023.33.018.
Full textShi, Lin, Teyi Liao, and Jianfeng He. "Defending Adversarial Attacks against DNN Image Classification Models by a Noise-Fusion Method." Electronics 11, no. 12 (June 8, 2022): 1814. http://dx.doi.org/10.3390/electronics11121814.
Full textSun, Guangling, Yuying Su, Chuan Qin, Wenbo Xu, Xiaofeng Lu, and Andrzej Ceglowski. "Complete Defense Framework to Protect Deep Neural Networks against Adversarial Examples." Mathematical Problems in Engineering 2020 (May 11, 2020): 1–17. http://dx.doi.org/10.1155/2020/8319249.
Full textSaxena, Rishabh, Amit Sanjay Adate, and Don Sasikumar. "A Comparative Study on Adversarial Noise Generation for Single Image Classification." International Journal of Intelligent Information Technologies 16, no. 1 (January 2020): 75–87. http://dx.doi.org/10.4018/ijiit.2020010105.
Full textAn, Tong, Tao Zhang, Yanzhang Geng, and Haiquan Jiao. "Normalized Combinations of Proportionate Affine Projection Sign Subband Adaptive Filter." Scientific Programming 2021 (August 26, 2021): 1–12. http://dx.doi.org/10.1155/2021/8826868.
Full textHirano, Hokuto, and Kazuhiro Takemoto. "Simple Iterative Method for Generating Targeted Universal Adversarial Perturbations." Algorithms 13, no. 11 (October 22, 2020): 268. http://dx.doi.org/10.3390/a13110268.
Full textZhang, Xingyu, Xiongwei Zhang, Xia Zou, Haibo Liu, and Meng Sun. "Towards Generating Adversarial Examples on Combined Systems of Automatic Speaker Verification and Spoofing Countermeasure." Security and Communication Networks 2022 (July 31, 2022): 1–12. http://dx.doi.org/10.1155/2022/2666534.
Full textPapadopoulos, Pavlos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, and William J. Buchanan. "Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT." Journal of Cybersecurity and Privacy 1, no. 2 (April 23, 2021): 252–73. http://dx.doi.org/10.3390/jcp1020014.
Full textDing, Ning, and Knut Möller. "Using adaptive learning rate to generate adversarial images." Current Directions in Biomedical Engineering 9, no. 1 (September 1, 2023): 359–62. http://dx.doi.org/10.1515/cdbme-2023-1090.
Full textYang, Zhongguo, Irshad Ahmed Abbasi, Fahad Algarni, Sikandar Ali, and Mingzhu Zhang. "An IoT Time Series Data Security Model for Adversarial Attack Based on Thermometer Encoding." Security and Communication Networks 2021 (March 9, 2021): 1–11. http://dx.doi.org/10.1155/2021/5537041.
Full textSantana, Everton Jose, Ricardo Petri Silva, Bruno Bogaz Zarpelão, and Sylvio Barbon Junior. "Detecting and Mitigating Adversarial Examples in Regression Tasks: A Photovoltaic Power Generation Forecasting Case Study." Information 12, no. 10 (September 26, 2021): 394. http://dx.doi.org/10.3390/info12100394.
Full textPantiukhin, D. V. "Educational and methodological materials of the master class “Adversarial attacks on image recognition neural networks” for students and schoolchildren." Informatics and education 38, no. 1 (April 16, 2023): 55–63. http://dx.doi.org/10.32517/0234-0453-2023-38-1-55-63.
Full textKumar, P. Sathish, and K. V. D. Kiran. "Momentum Iterative Fast Gradient Sign Algorithm for Adversarial Attacks and Defenses." Research Journal of Engineering and Technology, June 30, 2023, 7–24. http://dx.doi.org/10.52711/2321-581x.2023.00002.
Full textNaseem, Muhammad Luqman. "Trans-IFFT-FGSM: a novel fast gradient sign method for adversarial attacks." Multimedia Tools and Applications, February 9, 2024. http://dx.doi.org/10.1007/s11042-024-18475-7.
Full textXie, Pengfei, Shuhao Shi, Shuai Yang, Kai Qiao, Ningning Liang, Linyuan Wang, Jian Chen, Guoen Hu, and Bin Yan. "Improving the Transferability of Adversarial Examples With a Noise Data Enhancement Framework and Random Erasing." Frontiers in Neurorobotics 15 (December 9, 2021). http://dx.doi.org/10.3389/fnbot.2021.784053.
Full textZhang, Junjian, Hao Tan, Le Wang, Yaguan Qian, and Zhaoquan Gu. "Rethinking multi‐spatial information for transferable adversarial attacks on speaker recognition systems." CAAI Transactions on Intelligence Technology, March 29, 2024. http://dx.doi.org/10.1049/cit2.12295.
Full text