We investigate if the feature randomization approach to improve the robustness of forensic detectors to targeted attacks in network security, can be extended to detectors based on deep learning features. In particular, we study the transferability of adversarial examples targeting an original CNN image manipulation detector to other detectors that rely on a random subset of the features extracted from the flatten layer of the original network. The results we got by considering, two original network architectures and different classes of attacks, show that feature randomization helps to hinder attack transferability, even if, in some cases, simply changing the architecture of the detector, or even retraining the detector is enough to prevent...
Deep neural networks are known to be vulnerable to adversarial attacks. The empirical analysis in ou...
With the ubiquitous diffusion of social networks, images are becoming a dominant and powerful commun...
We address the problem of data-driven image manipulation detection in the presence of an attacker wi...
We investigate if the random feature selection approach proposed in [1] to improve the robustness of...
We investigate if the random feature selection approach proposed in [1] to improve the robustness of...
We investigate if the random feature selection approach proposed in [1] to improve the robustness of...
Recent studies have shown that Convolutional Neural Networks (CNN) are relatively easy to attack thr...
Recent studies have shown that Convolutional Neural Networks (CNN) are relatively easy to attack thr...
Recent studies have shown that Convolutional Neural Networks (CNN) are relatively easy to attack thr...
Convolutional Neural Networks (CNNs) models are one of the most frequently used deep learning networ...
Convolutional Neural Networks (CNNs) models are one of the most frequently used deep learning networ...
Convolutional Neural Networks (CNNs) models are one of the most frequently used deep learning networ...
Convolutional Neural Networks (CNNs) models are one of the most frequently used deep learning networ...
In the last decade, the use of Machine Learning techniques in anomaly-based intrusion detection syst...
The reason for the existence of adversarial samples is still barely understood. Here, we explore the...
Deep neural networks are known to be vulnerable to adversarial attacks. The empirical analysis in ou...
With the ubiquitous diffusion of social networks, images are becoming a dominant and powerful commun...
We address the problem of data-driven image manipulation detection in the presence of an attacker wi...
We investigate if the random feature selection approach proposed in [1] to improve the robustness of...
We investigate if the random feature selection approach proposed in [1] to improve the robustness of...
We investigate if the random feature selection approach proposed in [1] to improve the robustness of...
Recent studies have shown that Convolutional Neural Networks (CNN) are relatively easy to attack thr...
Recent studies have shown that Convolutional Neural Networks (CNN) are relatively easy to attack thr...
Recent studies have shown that Convolutional Neural Networks (CNN) are relatively easy to attack thr...
Convolutional Neural Networks (CNNs) models are one of the most frequently used deep learning networ...
Convolutional Neural Networks (CNNs) models are one of the most frequently used deep learning networ...
Convolutional Neural Networks (CNNs) models are one of the most frequently used deep learning networ...
Convolutional Neural Networks (CNNs) models are one of the most frequently used deep learning networ...
In the last decade, the use of Machine Learning techniques in anomaly-based intrusion detection syst...
The reason for the existence of adversarial samples is still barely understood. Here, we explore the...
Deep neural networks are known to be vulnerable to adversarial attacks. The empirical analysis in ou...
With the ubiquitous diffusion of social networks, images are becoming a dominant and powerful commun...
We address the problem of data-driven image manipulation detection in the presence of an attacker wi...