You are currently on the new version of our website. Access the old version .

2,931 Results Found

  • Article
  • Open Access
13 Citations
8,113 Views
29 Pages

Adversarial Patch Attacks on Deep-Learning-Based Face Recognition Systems Using Generative Adversarial Networks

  • Ren-Hung Hwang,
  • Jia-You Lin,
  • Sun-Ying Hsieh,
  • Hsuan-Yu Lin and
  • Chia-Liang Lin

11 January 2023

Deep learning technology has developed rapidly in recent years and has been successfully applied in many fields, including face recognition. Face recognition is used in many scenarios nowadays, including security control systems, access control manag...

  • Article
  • Open Access
5 Citations
2,492 Views
11 Pages

Quantum Adversarial Transfer Learning

  • Longhan Wang,
  • Yifan Sun and
  • Xiangdong Zhang

20 July 2023

Adversarial transfer learning is a machine learning method that employs an adversarial training process to learn the datasets of different domains. Recently, this method has attracted attention because it can efficiently decouple the requirements of...

  • Article
  • Open Access
31 Citations
4,730 Views
27 Pages

Adversarial Self-Supervised Learning for Robust SAR Target Recognition

  • Yanjie Xu,
  • Hao Sun,
  • Jin Chen,
  • Lin Lei,
  • Kefeng Ji and
  • Gangyao Kuang

17 October 2021

Synthetic aperture radar (SAR) can perform observations at all times and has been widely used in the military field. Deep neural network (DNN)-based SAR target recognition models have achieved great success in recent years. Yet, the adversarial robus...

  • Feature Paper
  • Article
  • Open Access
319 Views
27 Pages

6 December 2025

Adversarial learning has been attracting more and more attention thanks to the fast development of machine learning and artificial intelligence. However, due to the complicated structure of most machine learning models, the mechanism of adversarial a...

  • Review
  • Open Access
93 Citations
25,407 Views
27 Pages

Adversarial Training Methods for Deep Learning: A Systematic Review

  • Weimin Zhao,
  • Sanaa Alwidian and
  • Qusay H. Mahmoud

12 August 2022

Deep neural networks are exposed to the risk of adversarial attacks via the fast gradient sign method (FGSM), projected gradient descent (PGD) attacks, and other attack algorithms. Adversarial training is one of the methods used to defend against the...

  • Article
  • Open Access
1,664 Views
23 Pages

Reinforcement learning agents are highly susceptible to adversarial attacks that can severely compromise their performance. Although adversarial training is a common countermeasure, most existing research focuses on defending against single-type atta...

  • Article
  • Open Access
1 Citations
3,821 Views
18 Pages

Towards Adversarial Robustness for Multi-Mode Data through Metric Learning

  • Sarwar Khan,
  • Jun-Cheng Chen,
  • Wen-Hung Liao and
  • Chu-Song Chen

5 July 2023

Adversarial attacks have become one of the most serious security issues in widely used deep neural networks. Even though real-world datasets usually have large intra-variations or multiple modes, most adversarial defense methods, such as adversarial...

  • Review
  • Open Access
98 Citations
21,825 Views
34 Pages

31 January 2023

Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks...

  • Article
  • Open Access
6 Citations
3,775 Views
16 Pages

20 February 2021

Transfer learning using pre-trained deep neural networks (DNNs) has been widely used for plant disease identification recently. However, pre-trained DNNs are susceptible to adversarial attacks which generate adversarial samples causing DNN models to...

  • Review
  • Open Access
40 Citations
11,043 Views
42 Pages

A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks

  • Hassan Khazane,
  • Mohammed Ridouani,
  • Fatima Salahdine and
  • Naima Kaabouch

19 January 2024

With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem. Among these use cases is IoT security, where numerous systems are...

  • Article
  • Open Access
39 Citations
5,850 Views
28 Pages

25 June 2022

The ever-evolving cybersecurity environment has given rise to sophisticated adversaries who constantly explore new ways to attack cyberinfrastructure. Recently, the use of deep learning-based intrusion detection systems has been on the rise. This ris...

  • Article
  • Open Access
10 Citations
3,470 Views
18 Pages

Adversarial-Aware Deep Learning System Based on a Secondary Classical Machine Learning Verification Approach

  • Mohammed Alkhowaiter,
  • Hisham Kholidy,
  • Mnassar A. Alyami,
  • Abdulmajeed Alghamdi and
  • Cliff Zou

11 July 2023

Deep learning models have been used in creating various effective image classification applications. However, they are vulnerable to adversarial attacks that seek to misguide the models into predicting incorrect classes. Our study of major adversaria...

  • Article
  • Open Access
25 Citations
10,564 Views
10 Pages

Enhancing the Security of Deep Learning Steganography via Adversarial Examples

  • Yueyun Shang,
  • Shunzhi Jiang,
  • Dengpan Ye and
  • Jiaqing Huang

28 August 2020

Steganography is a collection of techniques for concealing the existence of information by embedding it within a cover. With the development of deep learning, some novel steganography methods have appeared based on the autoencoder or generative adver...

  • Article
  • Open Access
1 Citations
1,713 Views
13 Pages

A Speech Adversarial Sample Detection Method Based on Manifold Learning

  • Xiao Ma,
  • Dongliang Xu,
  • Chenglin Yang,
  • Panpan Li and
  • Dong Li

19 April 2024

Deep learning-based models have achieved impressive results across various practical fields. However, these models are susceptible to attacks. Recent research has demonstrated that adversarial samples can significantly decrease the accuracy of deep l...

  • Article
  • Open Access
18 Citations
6,680 Views
18 Pages

30 March 2023

SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL i...

  • Article
  • Open Access
4 Citations
2,282 Views
40 Pages

13 November 2024

The proliferation of deep learning has transformed artificial intelligence, demonstrating prowess in domains such as image recognition, natural language processing, and robotics. Nonetheless, deep learning models are susceptible to adversarial exampl...

  • Article
  • Open Access
34 Citations
10,438 Views
18 Pages

29 March 2022

Adversarial attacks pose a major threat to machine learning and to the systems that rely on it. In the cybersecurity domain, adversarial cyber-attack examples capable of evading detection are especially concerning. Nonetheless, an example generated f...

  • Review
  • Open Access
35 Citations
13,187 Views
41 Pages

A Comprehensive Review and Analysis of Deep Learning-Based Medical Image Adversarial Attack and Defense

  • Gladys W. Muoka,
  • Ding Yi,
  • Chiagoziem C. Ukwuoma,
  • Albert Mutale,
  • Chukwuebuka J. Ejiyi,
  • Asha Khamis Mzee,
  • Emmanuel S. A. Gyarteng,
  • Ali Alqahtani and
  • Mugahed A. Al-antari

13 October 2023

Deep learning approaches have demonstrated great achievements in the field of computer-aided medical image analysis, improving the precision of diagnosis across a range of medical disorders. These developments have not, however, been immune to the ap...

  • Article
  • Open Access
4 Citations
3,545 Views
13 Pages

22 January 2023

The research on image-classification-adversarial attacks is crucial in the realm of artificial intelligence (AI) security. Most of the image-classification-adversarial attack methods are for white-box settings, demanding target model gradients and ne...

  • Review
  • Open Access
7 Citations
4,753 Views
46 Pages

From Beginning to BEGANing: Role of Adversarial Learning in Reshaping Generative Models

  • Aradhita Bhandari,
  • Balakrushna Tripathy,
  • Amit Adate,
  • Rishabh Saxena and
  • Thippa Reddy Gadekallu

29 December 2022

Deep generative models, such as deep Boltzmann machines, focused on models that provided parametric specification of probability distribution functions. Such models are trained by maximizing intractable likelihood functions, and therefore require num...

  • Article
  • Open Access
23 Citations
3,505 Views
15 Pages

17 June 2024

Despite their high prediction accuracy, deep learning-based soft sensor (DLSS) models face challenges related to adversarial robustness against malicious adversarial attacks, which hinder their widespread deployment and safe application. Although adv...

  • Article
  • Open Access
1 Citations
3,875 Views
17 Pages

Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation

  • Mehdi Sadi,
  • Bashir Mohammad Sabquat Bahar Talukder,
  • Kaniz Mishty and
  • Md Tauhidur Rahman

19 September 2023

Universal adversarial perturbations are image-agnostic and model-independent noise that, when added to any image, can mislead the trained deep convolutional neural networks into the wrong prediction. Since these universal adversarial perturbations ca...

  • Article
  • Open Access
1,929 Views
20 Pages

25 October 2024

Federated Learning (FL), as a distributed machine learning method, is particularly suitable for training models that require large amounts of data while meeting increasingly strict data privacy and security requirements. Although FL effectively prote...

  • Article
  • Open Access
1 Citations
2,110 Views
13 Pages

17 December 2022

The spread of the COVID-19 pandemic has brought unprecedented challenges to pharmaceutical companies and their employees. Over the past three years, intensive antipandemic tasks have placed high demands on the physical and mental strength of pharmacy...

  • Article
  • Open Access
4 Citations
8,679 Views
23 Pages

A Survey of Adversarial Attacks: An Open Issue for Deep Learning Sentiment Analysis Models

  • Monserrat Vázquez-Hernández,
  • Luis Alberto Morales-Rosales,
  • Ignacio Algredo-Badillo,
  • Sofía Isabel Fernández-Gregorio,
  • Héctor Rodríguez-Rangel and
  • María-Luisa Córdoba-Tlaxcalteco

27 May 2024

In recent years, the use of deep learning models for deploying sentiment analysis systems has become a widespread topic due to their processing capacity and superior results on large volumes of information. However, after several years’ researc...

  • Article
  • Open Access
34 Citations
7,375 Views
13 Pages

14 August 2019

With the development of artificial intelligence, machine learning algorithms and deep learning algorithms are widely applied to attack detection models. Adversarial attacks against artificial intelligence models become inevitable problems when there...

  • Article
  • Open Access
34 Citations
3,783 Views
19 Pages

26 November 2020

Deep learning classifiers exhibit remarkable performance for hyperspectral image classification given sufficient labeled samples but show deficiency in the situation of learning with limited labeled samples. Active learning endows deep learning class...

  • Article
  • Open Access
3 Citations
2,520 Views
27 Pages

AOHDL: Adversarial Optimized Hybrid Deep Learning Design for Preventing Attack in Radar Target Detection

  • Muhammad Moin Akhtar,
  • Yong Li,
  • Wei Cheng,
  • Limeng Dong,
  • Yumei Tan and
  • Langhuan Geng

22 August 2024

In autonomous driving, Frequency-Modulated Continuous-Wave (FMCW) radar has gained widespread acceptance for target detection due to its resilience and dependability under diverse weather and illumination circumstances. Although deep learning radar t...

  • Review
  • Open Access
20 Citations
5,200 Views
39 Pages

18 August 2023

Deep Transfer Learning (DTL) signifies a novel paradigm in machine learning, merging the superiorities of deep learning in feature representation with the merits of transfer learning in knowledge transference. This synergistic integration propels DTL...

  • Article
  • Open Access
1 Citations
2,107 Views
11 Pages

Global-Local Dynamic Adversarial Learning for Cross-Domain Sentiment Analysis

  • Juntao Lyu,
  • Zheyuan Zhang,
  • Shufeng Chen and
  • Xiying Fan

15 July 2023

As one of the most widely used applications in domain adaption (DA), Cross-domain sentiment analysis (CDSA) aims to tackle the barrier of lacking in sentiment labeled data. Applying an adversarial network to DA to reduce the distribution discrepancy...

  • Article
  • Open Access
5 Citations
2,133 Views
22 Pages

Trustworthiness of Deep Learning Under Adversarial Attacks in Power Systems

  • Dowens Nicolas,
  • Kevin Orozco,
  • Steve Mathew,
  • Yi Wang,
  • Wafa Elmannai and
  • George C. Giakos

19 May 2025

Advanced as they are, DL models in cyber-physical systems remain vulnerable to attacks like the Fast Gradient Sign Method, DeepFool, and Jacobian-Based Saliency Map Attacks, rendering system trustworthiness impeccable in applications with high stakes...

  • Article
  • Open Access
3 Citations
1,794 Views
25 Pages

23 May 2024

This study introduces the Adversarial Task Augmented Sequential Meta-Learning (ATASML) framework, designed to enhance fault diagnosis in industrial processes. ATASML integrates adversarial learning with sequential task learning to improve the model&r...

  • Article
  • Open Access
3 Citations
2,713 Views
14 Pages

11 December 2024

Adversarial attacks targeting industrial control systems, such as the Maroochy wastewater system attack and the Stuxnet worm attack, have caused significant damage to related facilities. To enhance the security of industrial control systems, recent r...

  • Article
  • Open Access
10 Citations
6,105 Views
11 Pages

An LSTM Based Generative Adversarial Architecture for Robotic Calligraphy Learning System

  • Fei Chao,
  • Gan Lin,
  • Ling Zheng,
  • Xiang Chang,
  • Chih-Min Lin,
  • Longzhi Yang and
  • Changjing Shang

31 October 2020

Robotic calligraphy is a very challenging task for the robotic manipulators, which can sustain industrial manufacturing. The active mechanism of writing robots require a large sized training set including sequence information of the writing trajector...

  • Article
  • Open Access
1 Citations
2,377 Views
14 Pages

9 August 2023

Deep learning techniques have demonstrated significant advancements in the task of text classification. Regrettably, the majority of these techniques necessitate a substantial corpus of annotated data to achieve optimal performance. Meta-learning has...

  • Article
  • Open Access
2,406 Views
28 Pages

21 November 2025

The convergence of ubiquitous connectivity, large-scale data generation, and rapid advancements in machine learning is transforming the field of cybersecurity. The widespread adoption of interconnected systems including Internet of Things devices, mo...

  • Article
  • Open Access
3 Citations
1,973 Views
15 Pages

9 August 2023

Although the spectrum sensing algorithms based on deep learning have achieved remarkable detection performance, the sensing performance is easily affected by adversarial attacks due to the fragility of neural networks. Even slight adversarial perturb...

  • Article
  • Open Access
1,503 Views
31 Pages

9 March 2025

The pursuit of robust 3D object detection has emerged as a critical focus within the realm of computer vision. This paper presents a curriculum-guided adversarial learning (CGAL) framework, which significantly enhances the adversarial robustness and...

  • Article
  • Open Access
16 Citations
3,740 Views
25 Pages

19 June 2023

An intrusion detection system (IDS) is an effective tool for securing networks and a dependable technique for improving a user’s internet security. It informs the administration whenever strange conduct occurs. An IDS fundamentally depends on t...

  • Review
  • Open Access
2 Citations
4,869 Views
27 Pages

A Survey on Reinforcement Learning-Driven Adversarial Sample Generation for PE Malware

  • Yu Tong,
  • Hao Liang,
  • Hailong Ma,
  • Shuai Zhang and
  • Xiaohan Yang

Malware remains a central tool in cyberattacks, and systematic research into adversarial attack techniques targeting malware is crucial in advancing detection and defense systems that can evolve over time. Although numerous review articles already ex...

  • Article
  • Open Access
5 Citations
4,674 Views
15 Pages

30 June 2020

In this paper, we propose a new network model using variational learning to improve the learning stability of generative adversarial networks (GAN). The proposed method can be easily applied to improve the learning stability of GAN-based models that...

  • Article
  • Open Access
1 Citations
1,724 Views
30 Pages

31 August 2025

Offensive language and hate speech have a detrimental effect on victims and have become a significant problem on social media platforms. Recent research has developed automated techniques for detecting Arabic offensive language and hate speech but re...

  • Article
  • Open Access
7 Citations
2,803 Views
15 Pages

17 October 2024

A lightweight infrared image denoising method based on adversarial transfer learning is proposed. The method adopts a generative adversarial network (GAN) framework and optimizes the model through a phased transfer learning strategy. In the initial s...

  • Article
  • Open Access
26 Citations
12,045 Views
29 Pages

Improving the Robustness of AI-Based Malware Detection Using Adversarial Machine Learning

  • Shruti Patil,
  • Vijayakumar Varadarajan,
  • Devika Walimbe,
  • Siddharth Gulechha,
  • Sushant Shenoy,
  • Aditya Raina and
  • Ketan Kotecha

15 October 2021

Cyber security is used to protect and safeguard computers and various networks from ill-intended digital threats and attacks. It is getting more difficult in the information age due to the explosion of data and technology. There is a drastic rise in...

  • Article
  • Open Access
1 Citations
2,035 Views
19 Pages

Passive Bistatic Radar (PBR) has significant civilian and military applications due to its ability to detect low-altitude targets. However, the uncontrollable characteristics of the transmitter often lead to subpar target detection performance, prima...

  • Article
  • Open Access
9 Citations
8,732 Views
22 Pages

23 September 2024

Advancements in wireless communication and automation have revolutionized mobility systems, notably through autonomous vehicles and unmanned aerial vehicles (UAVs). UAV spatial coordinates, determined via Global Positioning System (GPS) signals, are...

  • Article
  • Open Access
2 Citations
2,168 Views
15 Pages

Infrared Adversarial Patch Generation Based on Reinforcement Learning

  • Shuangju Zhou,
  • Yang Li,
  • Wenyi Tan,
  • Chenxing Zhao,
  • Xin Zhou and
  • Quan Pan

24 October 2024

Recently, there has been an increasing concern about the vulnerability of infrared object detectors to adversarial attacks, where the object detector can be easily spoofed by adversarial samples with aggressive patches. Existing attacks employ light...

  • Article
  • Open Access
2 Citations
3,539 Views
19 Pages

Detecting High-Resolution Adversarial Images with Few-Shot Deep Learning

  • Junjie Zhao,
  • Junfeng Wu,
  • James Msughter Adeke,
  • Sen Qiao and
  • Jinwei Wang

30 April 2023

Deep learning models have enabled significant performance improvements to remote sensing image processing. Usually, a large number of training samples is required for detection models. In this study, a dynamic simulation training strategy is designed...

  • Article
  • Open Access
6 Citations
3,170 Views
24 Pages

19 April 2024

Recently, Machine Learning (ML)-based solutions have been widely adopted to tackle the wide range of security challenges that have affected the progress of the Internet of Things (IoT) in various domains. Despite the reported promising results, the M...

  • Article
  • Open Access
1 Citations
2,380 Views
22 Pages

ARMOR: Differential Model Distribution for Adversarially Robust Federated Learning

  • Yanting Zhang,
  • Jianwei Liu,
  • Zhenyu Guan,
  • Bihe Zhao,
  • Xianglun Leng and
  • Song Bian

In this work, we formalize the concept of differential model robustness (DMR), a new property for ensuring model security in federated learning (FL) systems. For most conventional FL frameworks, all clients receive the same global model. If there exi...

of 59