Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 3 von 4866
IEEE access, 2018-01, Vol.6, p.14410-14430
2018
Volltextzugriff (PDF)

Details

Autor(en) / Beteiligte
Titel
Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
Ist Teil von
  • IEEE access, 2018-01, Vol.6, p.14410-14430
Ort / Verlag
Piscataway: IEEE
Erscheinungsjahr
2018
Quelle
EZB Electronic Journals Library
Beschreibungen/Notizen
  • Deep learning is at the heart of the current rise of artificial intelligence. In the field of computer vision, it has become the workhorse for applications ranging from self-driving cars to surveillance and security. Whereas, deep neural networks have demonstrated phenomenal success (often beyond human capabilities) in solving complex problems, recent studies show that they are vulnerable to adversarial attacks in the form of subtle perturbations to inputs that lead a model to predict incorrect outputs. For images, such perturbations are often too small to be perceptible, yet they completely fool the deep learning models. Adversarial attacks pose a serious threat to the success of deep learning in practice. This fact has recently led to a large influx of contributions in this direction. This paper presents the first comprehensive survey on adversarial attacks on deep learning in computer vision. We review the works that design adversarial attacks, analyze the existence of such attacks and propose defenses against them. To emphasize that adversarial attacks are possible in practical conditions, we separately review the contributions that evaluate adversarial attacks in the real-world scenarios. Finally, drawing on the reviewed literature, we provide a broader outlook of this research direction.
Sprache
Englisch
Identifikatoren
ISSN: 2169-3536
eISSN: 2169-3536
DOI: 10.1109/ACCESS.2018.2807385
Titel-ID: cdi_crossref_primary_10_1109_ACCESS_2018_2807385

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX