all InfoSec news
Generating Image Adversarial Examples by Embedding Digital Watermarks. (arXiv:2009.05107v2 [cs.CV] UPDATED)
Aug. 5, 2022, 1:20 a.m. | Yuexin Xiang, Tiantian Li, Wei Ren, Tianqing Zhu, Kim-Kwang Raymond Choo
cs.CR updates on arXiv.org arxiv.org
With the increasing attention to deep neural network (DNN) models, attacks
are also upcoming for such models. For example, an attacker may carefully
construct images in specific ways (also referred to as adversarial examples)
aiming to mislead the DNN models to output incorrect classification results.
Similarly, many efforts are proposed to detect and mitigate adversarial
examples, usually for certain dedicated attacks. In this paper, we propose a
novel digital watermark-based method to generate image adversarial examples to
fool DNN models. …
More from arxiv.org / cs.CR updates on arXiv.org
One-shot Empirical Privacy Estimation for Federated Learning
1 day, 12 hours ago |
arxiv.org
Transferability Ranking of Adversarial Examples
1 day, 12 hours ago |
arxiv.org
A survey on hardware-based malware detection approaches
1 day, 12 hours ago |
arxiv.org
Explainable Ponzi Schemes Detection on Ethereum
1 day, 12 hours ago |
arxiv.org
Privacy-Preserving UCB Decision Process Verification via zk-SNARKs
1 day, 12 hours ago |
arxiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Network Security Engineer
@ Ørsted | Kuala Lumpur, MY
Senior Director of Foundation Relations, Johns Hopkins University & Medicine
@ Johns Hopkins University | Baltimore, MD, United States, 21209
Global Cybersecurity Head
@ CMA CGM | Marseille, FR
Cyber Security Analyst
@ QinetiQ US | Reston, VA, United States