Telemedicine applications have been recently evolved to allow patients in underdeveloped areas to receive medical services. Meanwhile, machine learning (ML) techniques have been widely adopted in such telemedicine applications to help in disease diagnosis. The performance of these ML techniques, however, are limited by the fact that attackers can manipulate clean data to fool the model classifier and break the truthfulness and robustness of these models. For instance, due to attacks, a benign sample can be treated as a malicious one by the classifier and vice versa. Motivated by this, this paper aims at exploring this issue for telemedicine applications. Particularly, this paper studies the impact of adversarial attacks on mammographic imag...
Pattern recognition systems based on machine learning techniques are nowadays widely used in many di...
Over the last decade, machine learning systems have achieved state-of-the-art performance in many fi...
Nowadays, Machine Learning (ML) solutions are widely adopted in modern malware and network intrusion...
Adversarial attacks are considered a potentially serious security threat for machine learning system...
Contains fulltext : 238599.pdf (Publisher’s version ) (Open Access)Adversarial att...
Adversarial attacks are considered a potentially serious security threat for machine learning system...
Adversarial attacks are considered a potentially serious security threat for machine learning system...
This repository contains trained models, training-validation-test splits, and other data used in exp...
Machine learning (ML) algorithms are the basis of many services we rely on in our everyday life. For...
Machine learning is being used in a wide range of application domains to discover patterns in large ...
Nowadays, in the health area, Artificial Intelligence (AI) becomes a must-have to improve diagnosis ...
Vulnerability to adversarial attacks is a well-known weakness of Deep Neural Networks. While most of...
Machine Learning models are susceptible to attacks, such as noise, privacy invasion, replay, false d...
Cyber security is used to protect and safeguard computers and various networks from ill-intended dig...
Thesis (Ph.D.)--University of Washington, 2019Deep neural networks have achieved remarkable success ...
Pattern recognition systems based on machine learning techniques are nowadays widely used in many di...
Over the last decade, machine learning systems have achieved state-of-the-art performance in many fi...
Nowadays, Machine Learning (ML) solutions are widely adopted in modern malware and network intrusion...
Adversarial attacks are considered a potentially serious security threat for machine learning system...
Contains fulltext : 238599.pdf (Publisher’s version ) (Open Access)Adversarial att...
Adversarial attacks are considered a potentially serious security threat for machine learning system...
Adversarial attacks are considered a potentially serious security threat for machine learning system...
This repository contains trained models, training-validation-test splits, and other data used in exp...
Machine learning (ML) algorithms are the basis of many services we rely on in our everyday life. For...
Machine learning is being used in a wide range of application domains to discover patterns in large ...
Nowadays, in the health area, Artificial Intelligence (AI) becomes a must-have to improve diagnosis ...
Vulnerability to adversarial attacks is a well-known weakness of Deep Neural Networks. While most of...
Machine Learning models are susceptible to attacks, such as noise, privacy invasion, replay, false d...
Cyber security is used to protect and safeguard computers and various networks from ill-intended dig...
Thesis (Ph.D.)--University of Washington, 2019Deep neural networks have achieved remarkable success ...
Pattern recognition systems based on machine learning techniques are nowadays widely used in many di...
Over the last decade, machine learning systems have achieved state-of-the-art performance in many fi...
Nowadays, Machine Learning (ML) solutions are widely adopted in modern malware and network intrusion...