Under the umbrella of Technology, there has been a rising interest in the following topics, Artificial Intelligence (AI), Machine Learning and Neural Networks over the recent years [4]. Neural Networks have been engaged by many in an attempt to do problem solving in machine learning tasks across various industrial domains. With the rising popularity and deployment of neural networks, it brings about security issues. Adversarial attacks on neural networks has become one of the major concerns as the attacks will result in the neural network to mis-classify or mis-predict. Therefore, this project is a research study on the defending techniques to protect the neural network from adversarial attacks. Cryptographic techniques will be looked int...
Neural Network uses a technique that mimics human brain to try to find hidden connections in a colle...
In recent years, it has been seen that deep neural networks are lacking robustness and are vulnerabl...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...
Under the umbrella of Technology, there has been a rising interest in the following topics, Artifici...
A current trend of research focuses on artificial intelligence based cryptography which although pro...
With the rapid evolution of the Internet, the application of artificial intelligence fields is more ...
Thesis (Ph.D.)--University of Washington, 2019Deep neural networks have achieved remarkable success ...
A Thesis Submitted In Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE in...
Artificial Intelligence (AI), such as deep learning algorithms, are widely used in modern technology...
Deep learning has achieved great successes in various types of applications over recent years. On th...
Prevalent use of Neural Networks for Classification Tasks has brought to attention the security and ...
Modern artificial intelligence systems largely rely on advanced algorithms, including machine learni...
Neural networks provide state-of-the-art results for most machine learning tasks. Unfortunately, neu...
Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in...
Machine learning algorithms based on neural networks are vulnerable to adversarial attacks. The use ...
Neural Network uses a technique that mimics human brain to try to find hidden connections in a colle...
In recent years, it has been seen that deep neural networks are lacking robustness and are vulnerabl...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...
Under the umbrella of Technology, there has been a rising interest in the following topics, Artifici...
A current trend of research focuses on artificial intelligence based cryptography which although pro...
With the rapid evolution of the Internet, the application of artificial intelligence fields is more ...
Thesis (Ph.D.)--University of Washington, 2019Deep neural networks have achieved remarkable success ...
A Thesis Submitted In Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE in...
Artificial Intelligence (AI), such as deep learning algorithms, are widely used in modern technology...
Deep learning has achieved great successes in various types of applications over recent years. On th...
Prevalent use of Neural Networks for Classification Tasks has brought to attention the security and ...
Modern artificial intelligence systems largely rely on advanced algorithms, including machine learni...
Neural networks provide state-of-the-art results for most machine learning tasks. Unfortunately, neu...
Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in...
Machine learning algorithms based on neural networks are vulnerable to adversarial attacks. The use ...
Neural Network uses a technique that mimics human brain to try to find hidden connections in a colle...
In recent years, it has been seen that deep neural networks are lacking robustness and are vulnerabl...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...