The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2023
DOI: 10.1007/s00500-023-07961-z
|View full text |Cite
|
Sign up to set email alerts
|

Detecting adversarial examples using image reconstruction differences

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 51 publications
0
0
0
Order By: Relevance
“…To ensure a stable and high performance of detecting AEs, Sun et al 35 proposed an AE detection method named image reconstruction differences (IRD) to enhance the robustness of DNNs. In the method, an end-to-end Com-Rec network is used to reconstruct adversarial examples with feature compression to expand the distinguishing features, the image reconstruction differences based on information-theoretic visual information fidelity (VIF), structural information universal quality index (UQI), and spectral information relative average spectral error (RASE) composition are introduced to discriminate adversarial examples.…”
Section: Image Reconstructionmentioning
confidence: 99%
See 1 more Smart Citation
“…To ensure a stable and high performance of detecting AEs, Sun et al 35 proposed an AE detection method named image reconstruction differences (IRD) to enhance the robustness of DNNs. In the method, an end-to-end Com-Rec network is used to reconstruct adversarial examples with feature compression to expand the distinguishing features, the image reconstruction differences based on information-theoretic visual information fidelity (VIF), structural information universal quality index (UQI), and spectral information relative average spectral error (RASE) composition are introduced to discriminate adversarial examples.…”
Section: Image Reconstructionmentioning
confidence: 99%
“…Some reforming mechanisms and denoising processes are effective transformation methods for defending against adversarial perturbations. [34][35][36][37][38][39][40] Stochastic defense methods try to replace deterministic models with stochastic structures by adding randomized sets or smoothing the distribution of predictions to increase the difficulty for invaders to produce effective adversarial perturbations. [41][42][43] Adversarial training methods attempt to correctly recognize the real class of adversarial examples by updating the objective functions of models and training with mixed clean images and adversarial examples.…”
Section: Introductionmentioning
confidence: 99%