Figure 4 - uploaded by Yalin E. Sagduyu
Content may be subject to copyright.
A typical convolutional neural network.

A typical convolutional neural network.

Source publication
Preprint
Full-text available
As Internet of Things (IoT) has emerged as the next logical stage of the Internet, it has become imperative to understand the vulnerabilities of the IoT systems when supporting diverse applications. Because machine learning has been applied in many IoT systems, the security implications of machine learning need to be studied following an adversaria...

Contexts in source publication

Context 1
... attack should be launched when controlled devices sensed possible confused signals, i.e., when the learned decision model by the adversary is less certain about the decision. Consider a convolutional neural network (shown in Fig.4), in which feature vectors are served as inputs of the framework. The next layers are the convolutional layers, which consist of convolutional and pooling operations. ...
Context 2
... attack should be launched when controlled devices sensed possible confused signals, i.e., when the learned decision model by the adversary is less certain about the decision. Consider a convolutional neural network (shown in Fig.4), in which feature vectors are served as inputs of the framework. The next layers are the convolutional layers, which consist of convolutional and pooling operations. ...

Similar publications

Article
Full-text available
Use of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the...
Article
Full-text available
Due to increased utilization of web and mixed media applications, image watermarking is attaining more popularity. Image watermarking attaches supplementary data about host (original) image as logo/sound/video or content. The primary point of watermarking is to dispense data integrity, copyright assurance, ownership identification and content valid...
Article
Full-text available
As the great advance in technology, 3D models are commonly used in multiple fields such as healthcare, filmdom, interactive entertainment, and construction industry. To prevent 3D data from unauthorized access and illegal tampering, we aim to propose a brand-new zero-watermarking technique based on the transformation of spherical coordinate and ske...
Article
Full-text available
Critical infrastructure systems consist of physical and cyber assets that are essential to the operation of the economy and the government. As one of the most important critical infrastructures worldwide, the water sector has become vulnerable to new risks in the form of cyber threats that can severely impact public health, and are difficult to det...
Article
Full-text available
In this paper, two logistic-map based fragile image watermarking schemes are proposed. The first scheme is a conventional irreversible, whereas the second scheme is a reversible one. The proposed first scheme considers a pair of two consecutive host image (HI) pixels for embedding the watermark bits. At the embedding end, each HI pixel observes a m...