Adversarial Attack, Defense, and Applications with Deep Learning Frameworks

Author(s):  
Zhizhou Yin ◽  
Wei Liu ◽  
Sanjay Chawla
2020 ◽  
Vol 26 ◽  
Author(s):  
Xiaoping Min ◽  
Fengqing Lu ◽  
Chunyan Li

: Enhancer-promoter interactions (EPIs) in the human genome are of great significance to transcriptional regulation which tightly controls gene expression. Identification of EPIs can help us better deciphering gene regulation and understanding disease mechanisms. However, experimental methods to identify EPIs are constrained by the fund, time and manpower while computational methods using DNA sequences and genomic features are viable alternatives. Deep learning methods have shown promising prospects in classification and efforts that have been utilized to identify EPIs. In this survey, we specifically focus on sequence-based deep learning methods and conduct a comprehensive review of the literatures of them. We first briefly introduce existing sequence-based frameworks on EPIs prediction and their technique details. After that, we elaborate on the dataset, pre-processing means and evaluation strategies. Finally, we discuss the challenges these methods are confronted with and suggest several future opportunities.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1798
Author(s):  
Stephen Dankwa ◽  
Lu Yang

The Internet of Things environment (e.g., smart phones, smart televisions, and smart watches) ensures that the end user experience is easy, by connecting lives on web services via the internet. Integrating Internet of Things devices poses ethical risks related to data security, privacy, reliability and management, data mining, and knowledge exchange. An adversarial machine learning attack is a good practice to adopt, to strengthen the security of text-based CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart), to withstand against malicious attacks from computer hackers, to protect Internet of Things devices and the end user’s privacy. The goal of this current study is to perform security vulnerability verification on adversarial text-based CAPTCHA, based on attacker–defender scenarios. Therefore, this study proposed computation-efficient deep learning with a mixed batch adversarial generation process model, which attempted to break the transferability attack, and mitigate the problem of catastrophic forgetting in the context of adversarial attack defense. After performing K-fold cross-validation, experimental results showed that the proposed defense model achieved mean accuracies in the range of 82–84% among three gradient-based adversarial attack datasets.


2021 ◽  
Vol 106 ◽  
pp. 104483
Author(s):  
Jaydeep Rade ◽  
Aditya Balu ◽  
Ethan Herron ◽  
Jay Pathak ◽  
Rishikesh Ranade ◽  
...  

Author(s):  
Ankit Vijayvargiya ◽  
Akshit Panchal ◽  
Abhijeet Parashar ◽  
Ayush Gautam ◽  
Jayesh Sharma ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document