2022
DOI: 10.1007/978-3-031-05933-9_38
|View full text |Cite
|
Sign up to set email alerts
|

Smooth Perturbations for Time Series Adversarial Attacks

Abstract: Adversarial attacks represent a threat to every deep neural network. They are particularly effective if they can perturb a given model while remaining undetectable. They have been initially introduced for image classifiers, and are well studied for this task. For time series, few attacks have yet been proposed. Most that have are adaptations of attacks previously proposed for image classifiers. Although these attacks are effective, they generate perturbations containing clearly discernible patterns such as saw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…For computer vision applications, the function M(•) in (2) encloses different manual transformations such as altering object properties (e.g., shape, location, texture), scene editing (e.g., illumination, camera view), or random noise injection [37]. For real-valued data input vectors, augmentation involves scaling, pattern switching, and random perturbation [38]. These augmentation methods are particularly interesting for wireless communication applications because they handle general signal transmission scenarios that are tolerant to variations in the path-loss coefficient, synchronization delays, signal-tonoise ratio, etc.…”
Section: ) Domain Randomizationmentioning
confidence: 99%
“…For computer vision applications, the function M(•) in (2) encloses different manual transformations such as altering object properties (e.g., shape, location, texture), scene editing (e.g., illumination, camera view), or random noise injection [37]. For real-valued data input vectors, augmentation involves scaling, pattern switching, and random perturbation [38]. These augmentation methods are particularly interesting for wireless communication applications because they handle general signal transmission scenarios that are tolerant to variations in the path-loss coefficient, synchronization delays, signal-tonoise ratio, etc.…”
Section: ) Domain Randomizationmentioning
confidence: 99%