Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Targeted Universal Adversarial Examples for Remote Sensing

View through CrossRef
Researchers are focusing on the vulnerabilities of deep learning models for remote sensing; various attack methods have been proposed, including universal adversarial examples. Existing universal adversarial examples, however, are only designed to fool deep learning models rather than target specific goals, i.e., targeted attacks. To this end, we propose two variants of universal adversarial examples called targeted universal adversarial examples and source-targeted universal adversarial examples. Extensive experiments on three popular datasets showed strong attackability of the two targeted adversarial variants. We hope such strong attacks can inspire and motivate research on the defenses against adversarial examples in remote sensing.
Title: Targeted Universal Adversarial Examples for Remote Sensing
Description:
Researchers are focusing on the vulnerabilities of deep learning models for remote sensing; various attack methods have been proposed, including universal adversarial examples.
Existing universal adversarial examples, however, are only designed to fool deep learning models rather than target specific goals, i.
e.
, targeted attacks.
To this end, we propose two variants of universal adversarial examples called targeted universal adversarial examples and source-targeted universal adversarial examples.
Extensive experiments on three popular datasets showed strong attackability of the two targeted adversarial variants.
We hope such strong attacks can inspire and motivate research on the defenses against adversarial examples in remote sensing.

Related Results

ProDef-MDS: A Proactive Defense Mechanism Protecting Malware Detection Systems from Adversarial Attacks
ProDef-MDS: A Proactive Defense Mechanism Protecting Malware Detection Systems from Adversarial Attacks
Malware threatens cybersecurity by enabling data theft, unauthorized access, and extortion. Traditional malware detection systems (MDS) struggle with the increasing volume and comp...
Comparison of Single-channel and Split-window Methods for Estimating Land Surface Temperature from Landsat 8 Data
Comparison of Single-channel and Split-window Methods for Estimating Land Surface Temperature from Landsat 8 Data
Abstract: Landsat 8 is the eighth satellite in the Landsat program, which provides images at 11 spectral channels, including 2 thermal infrared bands at a spatial resolution of 100...
Improving Diversity and Quality of Adversarial Examples in Adversarial Transformation Network
Improving Diversity and Quality of Adversarial Examples in Adversarial Transformation Network
Abstract This paper proposes a method to mitigate two major issues of Adversarial Transformation Networks (ATN) including the low diversity and the low quality of adversari...
Remote sensing abnormal extraction of hydroxyl alteration based on PCA method
Remote sensing abnormal extraction of hydroxyl alteration based on PCA method
Abstract Anomalous geological events often occur during the formation and evolution of mineral deposits. The use of remote sensing technology to extract anomalies is...
Challenges Facing the Use of Remote Sensing Technologies in the Construction Industry: A Review
Challenges Facing the Use of Remote Sensing Technologies in the Construction Industry: A Review
Remote sensing is essential in construction management by providing valuable information and insights throughout the project lifecycle. Due to the rapid advancement of remote sensi...
Efficient Defense Against First Order Adversarial Attacks on Convolutional Neural Networks
Efficient Defense Against First Order Adversarial Attacks on Convolutional Neural Networks
Machine learning models, especially neural networks, are vulnerable to adversarial attacks, where inputs are purposefully altered to induce incorrect predictions. These adversarial...
Universal Adversarial Purification with DDIM Metric Loss for Stable Diffusion
Universal Adversarial Purification with DDIM Metric Loss for Stable Diffusion
Stable Diffusion (SD) often produces degraded outputs when the training dataset contains adversarial noise. Adversarial purification offers a promising solution by removing adversa...
An enhanced ensemble defense framework for boosting adversarial robustness of intrusion detection systems
An enhanced ensemble defense framework for boosting adversarial robustness of intrusion detection systems
Abstract Machine learning (ML) and deep neural networks (DNN) have emerged as powerful tools for enhancing intrusion detection systems (IDS) in cybersecurity. However, re...

Back to Top