2021
DOI: 10.1007/978-3-030-79157-5_18
|View full text |Cite
|
Sign up to set email alerts
|

A Lipschitz - Shapley Explainable Defense Methodology Against Adversarial Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 24 publications
0
8
0
Order By: Relevance
“…However, it is common to use the probability logarithm l n (L n ) instead of the probability itself, as this practice leads to simpler calculations. e result, of course, remains the same as the logarithmic function is genuinely increasing [25,33,34].…”
Section: The Proposed Hybrid Deep Learning Htmmentioning
confidence: 73%
See 1 more Smart Citation
“…However, it is common to use the probability logarithm l n (L n ) instead of the probability itself, as this practice leads to simpler calculations. e result, of course, remains the same as the logarithmic function is genuinely increasing [25,33,34].…”
Section: The Proposed Hybrid Deep Learning Htmmentioning
confidence: 73%
“…When one or more cells in column i are in a predicted state during the t-th iteration of the algorithm, this can be interpreted as a system prediction that the next input element might trigger column i. erefore, if the activation of this column is observed during the repetition t + 1, then the prediction of the system is considered successful with the algorithm proceeding with the activation of the cells of the column which are in the predicted state. If, on the other hand, the column is not activated, then this means that the prediction turned out to be wrong, resulting in a reduction in the permanence values of the conclusions that contributed to its execution as a kind of "punishment" [17,24,25].…”
Section: The Proposed Hybrid Deep Learning Htmmentioning
confidence: 99%
“…To evaluate and validate the final model capability resulting from applying the proposed methodology, we use the [29,30,31] constant, which allows us to study the behavior of the scattering transformation when a set of similar inputs is introduced as input. This transformation can approximate the operation of a simple neural network architecture by allowing the study of how neural networks succeed in solving difficult problems in which multiscale feature extraction is required.…”
Section: The Solution Procedures Based On the Nasad Approachmentioning
confidence: 99%
“…So, for each of the three kinds of layers, we have: 1) Let layer π‘˜ is a convolution layer. As we express the inputs as one-dimensional vectors, the convolution with a two-dimensional kernel πœ“ π‘–π‘—π‘˜ , which connects the i channel of the output to the 𝑗 channel of the input, is implemented by multiplying the input vector by a matrix 𝐴 π‘–π‘—π‘˜ generated by the original kernel, such that [30,34]:…”
Section: The Solution Procedures Based On the Nasad Approachmentioning
confidence: 99%
“…It is a severe concern in the reliability and security of artificial intelligence technologies. The issue arises because learning techniques are intended for use in stable situations where training and test data are generated from the same, possibly unknown distribution [ 3 ]. A trained neural network, for example, represents a significant decision limit corresponding to a standard class.…”
Section: Introductionmentioning
confidence: 99%