DeSVig: Decentralized Swift Vigilance Against Adversarial Attacks in Industrial Artificial Intelligence Systems
暂无分享,去创建一个
Mianxiong Dong | Kaoru Ota | Jun Wu | Gaolei Li | Jianhua Li | M. Dong | K. Ota | Jianhua Li | Gaolei Li | Jun Wu
[1] Mianxiong Dong,et al. QUOIN: Incentive Mechanisms for Crowd Sensing Networks , 2018, IEEE Network.
[2] Shengcai Liao,et al. Perceptual hash-based feature description for person re-identification , 2018, Neurocomputing.
[3] Gang Wang,et al. Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks , 2019, AAAI.
[4] Rama Chellappa,et al. Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models , 2018, ICLR.
[5] Kin K. Leung,et al. When Edge Meets Learning: Adaptive Control for Resource-Constrained Distributed Machine Learning , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[6] David A. Wagner,et al. Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples , 2018, ICML.
[7] Ali Hassan Sodhro,et al. Artificial Intelligence-Driven Mechanism for Edge Computing-Based Industrial Applications , 2019, IEEE Transactions on Industrial Informatics.
[8] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[9] Ajmal Mian,et al. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.
[10] Alptekin Temizel,et al. The Effects of JPEG and JPEG2000 Compression on Attacks using Adversarial Examples , 2018, ArXiv.
[11] Jianhua Li,et al. Service Popularity-Based Smart Resources Partitioning for Fog Computing-Enabled Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[12] Tara Javidi,et al. Safe Machine Learning and Defeating Adversarial Attacks , 2018, IEEE Security & Privacy.
[13] Martin Wistuba,et al. Adversarial Robustness Toolbox v1.0.0 , 2018, 1807.01069.
[14] Biing-Hwang Juang,et al. Deep Learning in Physical Layer Communications , 2018, IEEE Wireless Communications.
[15] Joachim Sachs,et al. Adaptive 5G Low-Latency Communication for Tactile InternEt Services , 2019, Proceedings of the IEEE.
[16] Gerhard Fettweis,et al. 5G-Enabled Tactile Internet , 2016, IEEE Journal on Selected Areas in Communications.
[17] Andreas Kamilaris,et al. Deep learning in agriculture: A survey , 2018, Comput. Electron. Agric..
[18] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[19] Fang Liu,et al. Generalized Gaussian Mechanism for Differential Privacy , 2016, IEEE Transactions on Knowledge and Data Engineering.
[20] Andrés Felipe Murillo-Piedrahita,et al. Leveraging Software-Defined Networking for Incident Response in Industrial Control Systems , 2017, IEEE Software.
[21] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[22] Mianxiong Dong,et al. FCSS: Fog-Computing-based Content-Aware Filtering for Security Services in Information-Centric Social Networks , 2019, IEEE Transactions on Emerging Topics in Computing.
[23] James A. Storer,et al. Deflecting Adversarial Attacks with Pixel Deflection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[24] Biing-Hwang Juang,et al. Channel Agnostic End-to-End Learning Based Communication Systems with Conditional GAN , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).
[25] Mianxiong Dong,et al. Virtual Network Recognition and Optimization in SDN-Enabled Cloud Environment , 2018, IEEE Transactions on Cloud Computing.
[26] Mianxiong Dong,et al. ECCN: Orchestration of Edge-Centric Computing and Content-Centric Networking in the 5G Radio Access Network , 2018, IEEE Wireless Communications.
[27] Suman Jana,et al. Certified Robustness to Adversarial Examples with Differential Privacy , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[28] Frank H. P. Fitzek,et al. Reducing Latency in Virtual Machines: Enabling Tactile Internet for Human-Machine Co-Working , 2019, IEEE Journal on Selected Areas in Communications.
[29] Hamed Haddadi,et al. Deep Learning in Mobile and Wireless Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[30] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[31] C.-C. Jay Kuo,et al. Defense Against Adversarial Attacks with Saak Transform , 2018, ArXiv.
[32] Mianxiong Dong,et al. Energy Efficient Hybrid Edge Caching Scheme for Tactile Internet in 5G , 2019, IEEE Transactions on Green Communications and Networking.
[33] Vinod Vokkarane,et al. A New Deep Learning-Based Food Recognition System for Dietary Assessment on An Edge Computing Service Infrastructure , 2018, IEEE Transactions on Services Computing.
[34] Mohammad Abdullah Al Faruque,et al. Security trends and advances in manufacturing systems in the era of industry 4.0 , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[35] Valentina Zantedeschi,et al. Efficient Defenses Against Adversarial Attacks , 2017, AISec@CCS.
[36] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[37] Victor C. M. Leung,et al. MASM: A Multiple-Algorithm Service Model for Energy-Delay Optimization in Edge Artificial Intelligence , 2019, IEEE Transactions on Industrial Informatics.
[38] Dazhong Wu,et al. Deep learning for smart manufacturing: Methods and applications , 2018, Journal of Manufacturing Systems.
[39] Aditi Raghunathan,et al. Certified Defenses against Adversarial Examples , 2018, ICLR.
[40] Pan He,et al. Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.