²é¿´: 1100  |  »Ø¸´: 2

liyangnpu

Í­³æ (³õÈëÎÄ̳)

[½»Á÷] ר¿¯Õ÷¸å¡¾Future Generation Computer Systems¡¿ IF=7.187 ÒÑÓÐ2È˲ÎÓë

Special Issue -- Future-Generation Attack and Defense in Neural Networks (FGADNN)
Aims & Scopes
Neural Networks have demonstrated great success in many fields, e.g., natural language processing, image analysis, speech recognition, recommender system, physiological computing, etc. However, recent studies revealed that neural networks are vulnerable to adversarial attacks. The vulnerability of neural networks, which may hinder their adoption in high-stake scenarios. Thus, understanding their vulnerability and developing robust neural networks have attracted increasing attention.
To understand and accommodate the vulnerability of neural networks, various attack and defense techniques have been proposed.
According to the stage that the adversarial attack is performed, there are two types of attacks: poisoning attacks and evasion attacks. The former happens at the training stage, to create backdoors in the machine learning model by adding contaminated examples to the training set. The latter happens at the test stage, by adding deliberately designed tiny perturbations to benign test samples to mislead the neural network. According to how much the attacker knows about the target model, there are white-box, gray-box, and black-box attacks. According to the outcome, there are targeted attacks and non-targeted (indiscriminate) attacks. There are also many different attack scenarios, resulted from different combinations of these attack types.
Several different adversarial defense strategies have also been proposed, e.g., data modification, which modifies the training set in the training stage or the input data in the test stage, through adversarial training, gradient hiding, transferability blocking, data compression, data randomization, etc.; model modification, which modifies the target model directly to increase its robustness, by regularization, defensive distillation, feature squeezing,  using a deep contractive network or a mask layer, etc.; and, auxiliary tools, which may be additional auxiliary machine learning models to robustify the primary model, e.g., adversarial detection models, or defense generative adversarial nets (defense-GAN), high-level representation guided denoiser, etc.
Because of the popularity, complexity, and lack of interpretability of neural networks, it is expected that more attacks will immerge, in various different scenarios and applications. It is critically important to develop strategies to defend against them.
This special issue focuses on adversarial attacks and defenses in various future-generation neural networks, e.g., CNNs, LSTMs, ResNet, Transformers, BERT, spiking neural networks, and graph neural networks. We invite both reviews and original contributions, on the theory (design, understanding, visualization, and interpretation) and applications of adversarial attacks and defenses, in future-generation natural language processing, computer vision systems, speech recognition, recommender system, etc.
Topics of interest include, but are not limited to:
•        Novel adversarial attack approaches
•        Novel adversarial defense approaches
•        Model vulnerability discovery and explanation
•        Trust and interpretability of neural network
•        Attacks and/or defenses in NLP
•        Attacks and/or defenses in recommender systems
•        Attacks and/or defenses in computer vision
•        Attacks and/or defenses in speech recognition
•        Attacks and/or defenses in physiological computing
•        Adversarial attack and defense various future-generation applications
Evaluation Criterion
•        Novelty of the approach (how is it different from existing ones?)
•        Technical soundness (e.g., rigorous model evaluation)
•        Impact (how does it change the state-of-the-arts)
•        Readability (is it clear what has been done)
•        Reproducibility and open source: pre-registration if confirmatory claims are being made (e.g., via osf.io), open data, materials, code as much as ethically possible.
Submission Instructions
All submissions deemed suitable to be sent for peer review will be reviewed by at least two independent reviewers. Authors should prepare their manuscript according to the Guide for Authors available from the online submission page of the Future Generation Computer Systems at https://ees.elsevier.com/fgcs/. Authors should select ¡°VSI: NNVul¡± when they reach the ¡°Article Type¡± step in the submission process. Inquiries, including questions about appropriate topics, may be sent electronically to liyangnpu@nwpu.edu.cn.
Please make sure to read the Guide for Authors before writing your manuscript. The Guide for Authors and link to submit your manuscript is available on the Journal¡¯s homepage at: https://www.journals.elsevier.co ... n-computer-systems.
Important Dates
¡ñ Manuscript Submission Deadline: 20th June 2022
¡ñ Peer Review Due: 30th July 2022
¡ñ Revision Due: 15th September 2022
¡ñ Final Decision: 20th October 2022
Guest Editors and Bios:
Dr. Yang Li (Associate Professor)                Northwestern Polytechnical University, China
Dr. Dongrui Wu (Professor)                        Huazhong University of Science and Technology, China
Dr. Suhang Wang (Assistant Professor)        The Pennsylvania State University, University Park, USA
»Ø¸´´ËÂ¥
¿ÆÑУ¬Éú»î£¬ÃÎÏ룬ÏÖʵ
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

ÄäÃû

Óû§×¢Ïú (ÕýʽдÊÖ)

±¾Ìû½öÂ¥Ö÷¿É¼û
2Â¥2021-12-20 11:47:22
ÒÑÔÄ   ÉêÇëSEPI   »Ø¸´´ËÂ¥   ±à¼­   ²é¿´ÎÒµÄÖ÷Ò³

redmoonzpc

ÖÁ×ðľ³æ (ÖªÃû×÷¼Ò)

´ó½«

¶àÉÙÇ®1ƪ
3Â¥2021-12-21 21:30:09
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû
Ïà¹Ø°æ¿éÌø×ª ÎÒÒª¶©ÔÄÂ¥Ö÷ liyangnpu µÄÖ÷Ìâ¸üÐÂ
×î¾ßÈËÆøÈÈÌûÍÆ¼ö [²é¿´È«²¿] ×÷Õß »Ø/¿´ ×îºó·¢±í
[¿¼ÑÐ] Çóµ÷¼Á +5 yfihxh 2026-03-09 5/250 2026-03-11 18:35 by 18137688336
[¿¼ÑÐ] 337Ò»Ö¾Ô¸»ªÄÏÀí¹¤0805²ÄÁÏÇóµ÷¼Á +3 mysdl 2026-03-11 5/250 2026-03-11 18:06 by ÀÖѧxi
[¿¼ÑÐ] Ò»Ö¾Ô¸Ìì½ò´óѧ²ÄÁÏÓ뻯¹¤275Çóµ÷¼Á 10+5 ´©Ö»Ñ¥×Ó 2026-03-07 20/1000 2026-03-11 16:25 by ×íÔÚ·çÀï
[¿¼ÑÐ] 288Çóµ÷¼Á +13 ÍõÏþÑô- 2026-03-09 18/900 2026-03-11 14:01 by Linda Hu
[¿¼ÑÐ] Ò»Ö¾Ô¸ºÓº£´óѧ085900ÍÁľˮÀûר˶279Çóµ÷¼Á²»Ìôרҵ +3 SunWwWwWw 2026-03-10 3/150 2026-03-11 11:02 by ÍÁľ¹¤³Ì¹ýÏßµ÷¼
[¿¼ÑÐ] ²ÄÁϹ¤³Ì307£¬Çóµ÷¼Á +7 ÎÒҪȼÉÕÄãµÄÃÎ 2026-03-08 7/350 2026-03-11 09:09 by ½£Ê«¶Å¿µ
[¿¼ÑÐ] 282·Ö²ÄÁÏרҵÇóµ÷¼ÁԺУ +16 ·ãÇÅZL 2026-03-09 23/1150 2026-03-11 08:31 by ѧԱ8dgXkO
[¿¼ÑÐ] 085600 ²ÄÁÏÓ뻯¹¤ 295 Çóµ÷¼Á +9 dream¡­¡­ 2026-03-10 9/450 2026-03-10 22:24 by ½£Ê«¶Å¿µ
[¿¼ÑÐ] µ÷¼Á +5 µ÷¼ÁµÄ¿¼ÑÐѧÉú 2026-03-09 5/250 2026-03-10 22:13 by peike
[¿¼ÑÐ] 308Çóµ÷¼Á +4 ÊÇLupa°¡ 2026-03-08 7/350 2026-03-10 18:25 by Çå·çÔÂ
[¿¼ÑÐ] 0860Çóµ÷¼Á£¨272·Ö£© +3 lllllcsjsj 2026-03-05 4/200 2026-03-10 15:29 by circleffyy
[¿¼ÑÐ] Ò»Ö¾Ô¸Ìì´ó»¯¹¤£¨085600£©µ÷¼Á×Ü·Ö338 +5 ²Ì´óÃÀÅ® 2026-03-09 5/250 2026-03-10 14:44 by ruiyingmiao
[¿¼²©] Çó²ÄÁ϶Á²©ÔºÐ£ +9 yanglei131 2026-03-08 9/450 2026-03-10 11:54 by ÌìµÀ³êÇÚ2026686
[¿¼ÑÐ] һ־Ըɽ¶«´óѧ£¬×Ü·Ö327£¬Ó¢Óï¶þ79£¬ÓÐÂÛÎÄ£¬ÓоºÈü£¬ÒѹýËÄÁù¼¶ +3 ľľĿĿ1 2026-03-09 3/150 2026-03-09 19:52 by yuningshan
[¿¼ÑÐ] 320Çóµ÷¼Á +4 κzy 2026-03-08 4/200 2026-03-09 16:14 by ruiyingmiao
[¿¼ÑÐ] 307Çóµ÷¼Á +3 ÐÁÈʶ¹¸¯ 2026-03-08 5/250 2026-03-09 14:09 by macy2011
[¿¼ÑÐ] ²ÄÁϵ÷¼Á +7 ounce. 2026-03-05 15/750 2026-03-08 09:39 by wangjihu
[¿¼ÑÐ] 268Çóµ÷¼Á +4 ÁõºÏ»ª 2026-03-05 4/200 2026-03-06 11:18 by lature00
[¿¼ÑÐ] 282Çóµ÷¼Á +7 Ϧ¡«ÈÕ 2026-03-05 8/400 2026-03-05 21:31 by zzpnuli111
[¿¼ÑÐ] 293Çóµ÷¼Á +3 ÊÇÀÖÓåÍÛ 2026-03-04 3/150 2026-03-04 23:12 by wutongshun
ÐÅÏ¢Ìáʾ
ÇëÌî´¦ÀíÒâ¼û