2021
DOI: 10.3390/s21113922
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Attack and Defence through Adversarial Training and Feature Fusion for Diabetic Retinopathy Recognition

Abstract: Due to the rapid growth in artificial intelligence (AI) and deep learning (DL) approaches, the security and robustness of the deployed algorithms need to be guaranteed. The security susceptibility of the DL algorithms to adversarial examples has been widely acknowledged. The artificially created examples will lead to different instances negatively identified by the DL models that are humanly considered benign. Practical application in actual physical scenarios with adversarial threats shows their features. Thu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
26
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
4

Relationship

2
8

Authors

Journals

citations
Cited by 78 publications
(35 citation statements)
references
References 69 publications
0
26
0
Order By: Relevance
“…Recently, machine learning and deep learning approaches have been widely used in network security for optimization and classification due to the rapid growth in cloud computing and big data [2]. For instance, Lal et al [9] introduced a framework that can guarantee the security and robustness of those artificial intelligence approaches by preserving the classification with correct labeling. In addition, in network security, an intrusion detection system (IDS) is an application that can effectively detect malicious behaviors.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, machine learning and deep learning approaches have been widely used in network security for optimization and classification due to the rapid growth in cloud computing and big data [2]. For instance, Lal et al [9] introduced a framework that can guarantee the security and robustness of those artificial intelligence approaches by preserving the classification with correct labeling. In addition, in network security, an intrusion detection system (IDS) is an application that can effectively detect malicious behaviors.…”
Section: Related Workmentioning
confidence: 99%
“…A popular choice has been the use of NNs along with SVM which were the most popular technique for malware classification adversarial attacks. For feature selection and classifier hyperparameter tuning, nature-inspired and metaheuristic optimization methods such as the 'Bat Algorithm' could be applied [22,23].…”
Section: Introductionmentioning
confidence: 99%
“…The hybrid meta heuristic algorithm can enhance the performance of optimization problems by combing the exploration and exploitation features of different algorithms [25].…”
Section: Introductionmentioning
confidence: 99%