| 查看: 1055 | 回复: 2 | |||
liyangnpu铜虫 (初入文坛)
|
[交流]
专刊征稿【Future Generation Computer Systems】 IF=7.187 已有2人参与
|
|
Special Issue -- Future-Generation Attack and Defense in Neural Networks (FGADNN) Aims & Scopes Neural Networks have demonstrated great success in many fields, e.g., natural language processing, image analysis, speech recognition, recommender system, physiological computing, etc. However, recent studies revealed that neural networks are vulnerable to adversarial attacks. The vulnerability of neural networks, which may hinder their adoption in high-stake scenarios. Thus, understanding their vulnerability and developing robust neural networks have attracted increasing attention. To understand and accommodate the vulnerability of neural networks, various attack and defense techniques have been proposed. According to the stage that the adversarial attack is performed, there are two types of attacks: poisoning attacks and evasion attacks. The former happens at the training stage, to create backdoors in the machine learning model by adding contaminated examples to the training set. The latter happens at the test stage, by adding deliberately designed tiny perturbations to benign test samples to mislead the neural network. According to how much the attacker knows about the target model, there are white-box, gray-box, and black-box attacks. According to the outcome, there are targeted attacks and non-targeted (indiscriminate) attacks. There are also many different attack scenarios, resulted from different combinations of these attack types. Several different adversarial defense strategies have also been proposed, e.g., data modification, which modifies the training set in the training stage or the input data in the test stage, through adversarial training, gradient hiding, transferability blocking, data compression, data randomization, etc.; model modification, which modifies the target model directly to increase its robustness, by regularization, defensive distillation, feature squeezing, using a deep contractive network or a mask layer, etc.; and, auxiliary tools, which may be additional auxiliary machine learning models to robustify the primary model, e.g., adversarial detection models, or defense generative adversarial nets (defense-GAN), high-level representation guided denoiser, etc. Because of the popularity, complexity, and lack of interpretability of neural networks, it is expected that more attacks will immerge, in various different scenarios and applications. It is critically important to develop strategies to defend against them. This special issue focuses on adversarial attacks and defenses in various future-generation neural networks, e.g., CNNs, LSTMs, ResNet, Transformers, BERT, spiking neural networks, and graph neural networks. We invite both reviews and original contributions, on the theory (design, understanding, visualization, and interpretation) and applications of adversarial attacks and defenses, in future-generation natural language processing, computer vision systems, speech recognition, recommender system, etc. Topics of interest include, but are not limited to: • Novel adversarial attack approaches • Novel adversarial defense approaches • Model vulnerability discovery and explanation • Trust and interpretability of neural network • Attacks and/or defenses in NLP • Attacks and/or defenses in recommender systems • Attacks and/or defenses in computer vision • Attacks and/or defenses in speech recognition • Attacks and/or defenses in physiological computing • Adversarial attack and defense various future-generation applications Evaluation Criterion • Novelty of the approach (how is it different from existing ones?) • Technical soundness (e.g., rigorous model evaluation) • Impact (how does it change the state-of-the-arts) • Readability (is it clear what has been done) • Reproducibility and open source: pre-registration if confirmatory claims are being made (e.g., via osf.io), open data, materials, code as much as ethically possible. Submission Instructions All submissions deemed suitable to be sent for peer review will be reviewed by at least two independent reviewers. Authors should prepare their manuscript according to the Guide for Authors available from the online submission page of the Future Generation Computer Systems at https://ees.elsevier.com/fgcs/. Authors should select “VSI: NNVul” when they reach the “Article Type” step in the submission process. Inquiries, including questions about appropriate topics, may be sent electronically to liyangnpu@nwpu.edu.cn. Please make sure to read the Guide for Authors before writing your manuscript. The Guide for Authors and link to submit your manuscript is available on the Journal’s homepage at: https://www.journals.elsevier.co ... n-computer-systems. Important Dates ● Manuscript Submission Deadline: 20th June 2022 ● Peer Review Due: 30th July 2022 ● Revision Due: 15th September 2022 ● Final Decision: 20th October 2022 Guest Editors and Bios: Dr. Yang Li (Associate Professor) Northwestern Polytechnical University, China Dr. Dongrui Wu (Professor) Huazhong University of Science and Technology, China Dr. Suhang Wang (Assistant Professor) The Pennsylvania State University, University Park, USA |
» 猜你喜欢
交叉科学部支持青年基金,对三无青椒是个机会吗?
已经有7人回复
青椒八年已不青,大家都被折磨成啥样了?
已经有15人回复
多组分精馏求助
已经有4人回复
免疫学博士有名额,速联系
已经有4人回复
国家基金申请书模板内插入图片不可调整大小?
已经有6人回复
国家级人才课题组招收2026年入学博士
已经有5人回复
Fe3O4@SiO2合成
已经有6人回复
青年基金C终止
已经有4人回复
26申博求博导推荐-遥感图像处理方向
已经有4人回复
西南交通大学国家级人才团队2026年博士研究生招生(考核制)—机械、材料、力学方向
已经有3人回复

2楼2021-12-20 11:47:22
redmoonzpc
至尊木虫 (知名作家)
大将
- 应助: 6 (幼儿园)
- 金币: 29273
- 散金: 8
- 红花: 29
- 帖子: 7285
- 在线: 497.6小时
- 虫号: 1077032
- 注册: 2010-08-18
- 专业: 自然语言理解与机器翻译
3楼2021-12-21 21:30:09













回复此楼