Adversarial Examples Identification in an End-to-End System With Image Transformation and Filters

Deep learning has been receiving great attention in recent years because of its impressive performance in many tasks. However, the widespread adoption of deep learning also becomes a major security risk for those systems as recent researches have pointed out the vulnerabilities of deep learning mode...

Full description

Bibliographic Details
Main Authors: Dang Duy Thang, Toshihiro Matsui
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9022936/