Undetectable Attack to Deep Neural Networks Without Using Model Parameters.
Chen YangYinyan ZhangAmeer Hamza KhanPublished in: ICIC (2) (2023)
Keyphrases
- neural network
- pattern recognition
- genetic algorithm
- countermeasures
- fuzzy logic
- neural nets
- feed forward
- multilayer perceptron
- network architecture
- multi layer
- recurrent neural networks
- back propagation
- fault diagnosis
- training algorithm
- artificial neural networks
- competitive learning
- detection mechanism
- neural network model
- sufficient conditions
- support vector machine
- deep learning
- deep architectures
- malicious users