Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks.
Nilaksh DasHaekyu ParkZijie J. WangFred HohmanRobert FirstmanEmily RogersDuen Horng ChauPublished in: CoRR (2020)
Keyphrases
- neural network
- countermeasures
- fuzzy logic
- malicious attacks
- genetic algorithm
- fuzzy systems
- pattern recognition
- deep learning
- neural network model
- self organizing maps
- security protocols
- artificial neural networks
- multi agent
- traffic analysis
- machine learning
- data mining
- back propagation
- security risks
- recurrent neural networks
- data sets
- network architecture
- multilayer perceptron
- feed forward
- user interaction
- access control
- signal processing
- web applications
- decision trees
- social networks