Discretization Based Solutions for Secure Machine Learning Against Adversarial Attacks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models

Many machine learning algorithms are vulnerable to almost imperceptible perturbations of their inputs. So far it was unclear how much risk adversarial perturbations carry for the safety of real-world machine learning applications because most methods used to generate such perturbations rely either on detailed model information (gradient-based attacks) or on confidence scores such as class proba...

متن کامل

Adversarial and Secure Machine Learning

The advance of machine learning has enabled establishments of many automatic systems, leveraging its outstanding predictive power. From face recognition to recommendation systems and to social network relationship mining, machine learning found its rising attention from both researchers and practitioners in many different domains. Data-driven technologies based on machine learning facilitate th...

متن کامل

Decision-based Adversarial Attacks: Reliable Attacks against Black-box Machine Learning Models

Many machine learning algorithms are vulnerable to almost imperceptible perturbations of their inputs. So far it was unclear how much risk adversarial perturbations carry for the safety of real-world machine learning applications because most methods used to generate such perturbations rely either on detailed model information (gradient-based attacks) or on confidence scores such as class proba...

متن کامل

Secure Estimation for Unmanned Aerial Vehicles against Adversarial Attacks

On February 15, 2015, the Federal Aviation Administration proposed to allow routine use of certain small, non-recreational Unmanned Aerial Vehicles (UAVs) in today’s aviation system [1]. Thus in the near future, we may see UAVs such as Amazon Prime Air [2] and Google Project Wing vehicles [3] sharing the airspace. In order to manage this UAV traffic, we may imagine a scenario in which each UAV ...

متن کامل

Secure Estimation for Unmanned Aerial Vehicles against Adversarial Cyber Attacks

In the coming years, usage of Unmanned Aerial Vehicles (UAVs) is expected to grow tremendously. Maintaining security of UAVs under cyber attacks is an important yet challenging task, as these attacks are often erratic and difficult to predict. Secure estimation problems study how to estimate the states of a dynamical system from a set of noisy and maliciously corrupted sensor measurements. The ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2019

ISSN: 2169-3536

DOI: 10.1109/access.2019.2919463