Sorry, you need to enable JavaScript to visit this website.

GlobalSIP 2018

The 6th IEEE Global Conference on Signal and Information Processing (GlobalSIP)  focuses on signal and information processing with an emphasis on up-and-coming signal processing themes. The conference features world-class plenary speeches, distinguished symposium talks, tutorials, exhibits, oral and poster sessions, and panels. GlobalSIP is comprised of co-located General Symposium and symposia selected based on responses to the call-for-symposia proposals.

Defending DNN Adversarial Attacks with Pruning and Logits Augmentation


Deep neural networks (DNNs) have been shown to be powerful models and perform extremely well on many complicated artificial intelligent tasks. However, recent research found that these powerful models are vulnerable to adversarial attacks, i.e., intentionally added imperceptible perturbations to DNN inputs can easily mislead the DNNs with extremely high confidence.

Paper Details

Authors:
Siyue Wang, Xiao Wang, Shaokai Ye, Pu Zhao, Xue Lin
Submitted On:
28 November 2018 - 9:00pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

GlobalSip_Final.pdf

(15 downloads)

Subscribe

[1] Siyue Wang, Xiao Wang, Shaokai Ye, Pu Zhao, Xue Lin, "Defending DNN Adversarial Attacks with Pruning and Logits Augmentation", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3829. Accessed: Dec. 16, 2018.
@article{3829-18,
url = {http://sigport.org/3829},
author = {Siyue Wang; Xiao Wang; Shaokai Ye; Pu Zhao; Xue Lin },
publisher = {IEEE SigPort},
title = {Defending DNN Adversarial Attacks with Pruning and Logits Augmentation},
year = {2018} }
TY - EJOUR
T1 - Defending DNN Adversarial Attacks with Pruning and Logits Augmentation
AU - Siyue Wang; Xiao Wang; Shaokai Ye; Pu Zhao; Xue Lin
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3829
ER -
Siyue Wang, Xiao Wang, Shaokai Ye, Pu Zhao, Xue Lin. (2018). Defending DNN Adversarial Attacks with Pruning and Logits Augmentation. IEEE SigPort. http://sigport.org/3829
Siyue Wang, Xiao Wang, Shaokai Ye, Pu Zhao, Xue Lin, 2018. Defending DNN Adversarial Attacks with Pruning and Logits Augmentation. Available at: http://sigport.org/3829.
Siyue Wang, Xiao Wang, Shaokai Ye, Pu Zhao, Xue Lin. (2018). "Defending DNN Adversarial Attacks with Pruning and Logits Augmentation." Web.
1. Siyue Wang, Xiao Wang, Shaokai Ye, Pu Zhao, Xue Lin. Defending DNN Adversarial Attacks with Pruning and Logits Augmentation [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3829

Defending DNN Adversarial Attacks with Pruning and Logits Augmentation


Deep neural networks (DNNs) have been shown to be powerful models and perform extremely well on many complicated artificial intelligent tasks. However, recent research found that these powerful models are vulnerable to adversarial attacks, i.e., intentionally added imperceptible perturbations to DNN inputs can easily mislead the DNNs with extremely high confidence.

Paper Details

Authors:
Siyue Wang, Xiao Wang, Shaokai Ye, Pu Zhao, Xue Lin
Submitted On:
28 November 2018 - 8:40pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

GlobalSip_Final.pptx

(9 downloads)

Subscribe

[1] Siyue Wang, Xiao Wang, Shaokai Ye, Pu Zhao, Xue Lin, "Defending DNN Adversarial Attacks with Pruning and Logits Augmentation", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3828. Accessed: Dec. 16, 2018.
@article{3828-18,
url = {http://sigport.org/3828},
author = {Siyue Wang; Xiao Wang; Shaokai Ye; Pu Zhao; Xue Lin },
publisher = {IEEE SigPort},
title = {Defending DNN Adversarial Attacks with Pruning and Logits Augmentation},
year = {2018} }
TY - EJOUR
T1 - Defending DNN Adversarial Attacks with Pruning and Logits Augmentation
AU - Siyue Wang; Xiao Wang; Shaokai Ye; Pu Zhao; Xue Lin
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3828
ER -
Siyue Wang, Xiao Wang, Shaokai Ye, Pu Zhao, Xue Lin. (2018). Defending DNN Adversarial Attacks with Pruning and Logits Augmentation. IEEE SigPort. http://sigport.org/3828
Siyue Wang, Xiao Wang, Shaokai Ye, Pu Zhao, Xue Lin, 2018. Defending DNN Adversarial Attacks with Pruning and Logits Augmentation. Available at: http://sigport.org/3828.
Siyue Wang, Xiao Wang, Shaokai Ye, Pu Zhao, Xue Lin. (2018). "Defending DNN Adversarial Attacks with Pruning and Logits Augmentation." Web.
1. Siyue Wang, Xiao Wang, Shaokai Ye, Pu Zhao, Xue Lin. Defending DNN Adversarial Attacks with Pruning and Logits Augmentation [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3828

Sparse tensor recovery via N-mode FISTA with support augmentation

Paper Details

Authors:
Ashley Prater-Bennette, Lixin Shen
Submitted On:
28 November 2018 - 6:12pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

PraterBennette_GlobalSIP_1176_Presentation_v3.pdf

(15 downloads)

Subscribe

[1] Ashley Prater-Bennette, Lixin Shen, "Sparse tensor recovery via N-mode FISTA with support augmentation", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3827. Accessed: Dec. 16, 2018.
@article{3827-18,
url = {http://sigport.org/3827},
author = {Ashley Prater-Bennette; Lixin Shen },
publisher = {IEEE SigPort},
title = {Sparse tensor recovery via N-mode FISTA with support augmentation},
year = {2018} }
TY - EJOUR
T1 - Sparse tensor recovery via N-mode FISTA with support augmentation
AU - Ashley Prater-Bennette; Lixin Shen
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3827
ER -
Ashley Prater-Bennette, Lixin Shen. (2018). Sparse tensor recovery via N-mode FISTA with support augmentation. IEEE SigPort. http://sigport.org/3827
Ashley Prater-Bennette, Lixin Shen, 2018. Sparse tensor recovery via N-mode FISTA with support augmentation. Available at: http://sigport.org/3827.
Ashley Prater-Bennette, Lixin Shen. (2018). "Sparse tensor recovery via N-mode FISTA with support augmentation." Web.
1. Ashley Prater-Bennette, Lixin Shen. Sparse tensor recovery via N-mode FISTA with support augmentation [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3827

Sparse tensor recovery via N-mode FISTA with support augmentation

Paper Details

Authors:
Ashley Prater-Bennette, Lixin Shen
Submitted On:
28 November 2018 - 6:12pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

PraterBennette_GlobalSIP_1176_Presentation_v3.pdf

(15 downloads)

Subscribe

[1] Ashley Prater-Bennette, Lixin Shen, "Sparse tensor recovery via N-mode FISTA with support augmentation", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3826. Accessed: Dec. 16, 2018.
@article{3826-18,
url = {http://sigport.org/3826},
author = {Ashley Prater-Bennette; Lixin Shen },
publisher = {IEEE SigPort},
title = {Sparse tensor recovery via N-mode FISTA with support augmentation},
year = {2018} }
TY - EJOUR
T1 - Sparse tensor recovery via N-mode FISTA with support augmentation
AU - Ashley Prater-Bennette; Lixin Shen
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3826
ER -
Ashley Prater-Bennette, Lixin Shen. (2018). Sparse tensor recovery via N-mode FISTA with support augmentation. IEEE SigPort. http://sigport.org/3826
Ashley Prater-Bennette, Lixin Shen, 2018. Sparse tensor recovery via N-mode FISTA with support augmentation. Available at: http://sigport.org/3826.
Ashley Prater-Bennette, Lixin Shen. (2018). "Sparse tensor recovery via N-mode FISTA with support augmentation." Web.
1. Ashley Prater-Bennette, Lixin Shen. Sparse tensor recovery via N-mode FISTA with support augmentation [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3826

Siamese Network with Multi-level Features for Patch-based Change Detection in Satellite Imagery

Paper Details

Authors:
Faiz Ur Rahman, Bhavan Kumar Vasu, Jared Van Cor, John Kerekes, Andreas Savakis
Submitted On:
28 November 2018 - 2:51pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Siamese_Network_RIT_Nov2018.pdf

(11 downloads)

Subscribe

[1] Faiz Ur Rahman, Bhavan Kumar Vasu, Jared Van Cor, John Kerekes, Andreas Savakis, "Siamese Network with Multi-level Features for Patch-based Change Detection in Satellite Imagery", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3825. Accessed: Dec. 16, 2018.
@article{3825-18,
url = {http://sigport.org/3825},
author = {Faiz Ur Rahman; Bhavan Kumar Vasu; Jared Van Cor; John Kerekes; Andreas Savakis },
publisher = {IEEE SigPort},
title = {Siamese Network with Multi-level Features for Patch-based Change Detection in Satellite Imagery},
year = {2018} }
TY - EJOUR
T1 - Siamese Network with Multi-level Features for Patch-based Change Detection in Satellite Imagery
AU - Faiz Ur Rahman; Bhavan Kumar Vasu; Jared Van Cor; John Kerekes; Andreas Savakis
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3825
ER -
Faiz Ur Rahman, Bhavan Kumar Vasu, Jared Van Cor, John Kerekes, Andreas Savakis. (2018). Siamese Network with Multi-level Features for Patch-based Change Detection in Satellite Imagery. IEEE SigPort. http://sigport.org/3825
Faiz Ur Rahman, Bhavan Kumar Vasu, Jared Van Cor, John Kerekes, Andreas Savakis, 2018. Siamese Network with Multi-level Features for Patch-based Change Detection in Satellite Imagery. Available at: http://sigport.org/3825.
Faiz Ur Rahman, Bhavan Kumar Vasu, Jared Van Cor, John Kerekes, Andreas Savakis. (2018). "Siamese Network with Multi-level Features for Patch-based Change Detection in Satellite Imagery." Web.
1. Faiz Ur Rahman, Bhavan Kumar Vasu, Jared Van Cor, John Kerekes, Andreas Savakis. Siamese Network with Multi-level Features for Patch-based Change Detection in Satellite Imagery [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3825

Relay-Aided Secure Broadcasting for VLC

Paper Details

Authors:
Ahmed Arafa, Erdal Panayirci, H. Vincent Poor
Submitted On:
28 November 2018 - 2:48pm
Short Link:
Type:
Event:
Presenter's Name:

Document Files

Presentation Slides

(11 downloads)

Subscribe

[1] Ahmed Arafa, Erdal Panayirci, H. Vincent Poor, "Relay-Aided Secure Broadcasting for VLC", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3824. Accessed: Dec. 16, 2018.
@article{3824-18,
url = {http://sigport.org/3824},
author = {Ahmed Arafa; Erdal Panayirci; H. Vincent Poor },
publisher = {IEEE SigPort},
title = {Relay-Aided Secure Broadcasting for VLC},
year = {2018} }
TY - EJOUR
T1 - Relay-Aided Secure Broadcasting for VLC
AU - Ahmed Arafa; Erdal Panayirci; H. Vincent Poor
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3824
ER -
Ahmed Arafa, Erdal Panayirci, H. Vincent Poor. (2018). Relay-Aided Secure Broadcasting for VLC. IEEE SigPort. http://sigport.org/3824
Ahmed Arafa, Erdal Panayirci, H. Vincent Poor, 2018. Relay-Aided Secure Broadcasting for VLC. Available at: http://sigport.org/3824.
Ahmed Arafa, Erdal Panayirci, H. Vincent Poor. (2018). "Relay-Aided Secure Broadcasting for VLC." Web.
1. Ahmed Arafa, Erdal Panayirci, H. Vincent Poor. Relay-Aided Secure Broadcasting for VLC [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3824

Learning to dynamically price electricity demand based on multi-armed bandit

Paper Details

Authors:
Ahmadreza Moradipari, Cody Silva, Mahnoosh alizadeh
Submitted On:
29 November 2018 - 1:42am
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

Presentation4.pptx

(9 downloads)

Presentation4.pptx

(11 downloads)

Keywords

Additional Categories

Subscribe

[1] Ahmadreza Moradipari, Cody Silva, Mahnoosh alizadeh, "Learning to dynamically price electricity demand based on multi-armed bandit ", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3823. Accessed: Dec. 16, 2018.
@article{3823-18,
url = {http://sigport.org/3823},
author = {Ahmadreza Moradipari; Cody Silva; Mahnoosh alizadeh },
publisher = {IEEE SigPort},
title = {Learning to dynamically price electricity demand based on multi-armed bandit },
year = {2018} }
TY - EJOUR
T1 - Learning to dynamically price electricity demand based on multi-armed bandit
AU - Ahmadreza Moradipari; Cody Silva; Mahnoosh alizadeh
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3823
ER -
Ahmadreza Moradipari, Cody Silva, Mahnoosh alizadeh. (2018). Learning to dynamically price electricity demand based on multi-armed bandit . IEEE SigPort. http://sigport.org/3823
Ahmadreza Moradipari, Cody Silva, Mahnoosh alizadeh, 2018. Learning to dynamically price electricity demand based on multi-armed bandit . Available at: http://sigport.org/3823.
Ahmadreza Moradipari, Cody Silva, Mahnoosh alizadeh. (2018). "Learning to dynamically price electricity demand based on multi-armed bandit ." Web.
1. Ahmadreza Moradipari, Cody Silva, Mahnoosh alizadeh. Learning to dynamically price electricity demand based on multi-armed bandit [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3823

Set-Theoretic Learning for Detection in Cell-Less C-RAN Systems

Paper Details

Authors:
R.L.G Cavalcante, Zoran Utkovski, Slawomir Stanczak
Submitted On:
28 November 2018 - 12:09pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

GlobalSip 2018

(11 downloads)

Subscribe

[1] R.L.G Cavalcante, Zoran Utkovski, Slawomir Stanczak, "Set-Theoretic Learning for Detection in Cell-Less C-RAN Systems", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3822. Accessed: Dec. 16, 2018.
@article{3822-18,
url = {http://sigport.org/3822},
author = {R.L.G Cavalcante; Zoran Utkovski; Slawomir Stanczak },
publisher = {IEEE SigPort},
title = {Set-Theoretic Learning for Detection in Cell-Less C-RAN Systems},
year = {2018} }
TY - EJOUR
T1 - Set-Theoretic Learning for Detection in Cell-Less C-RAN Systems
AU - R.L.G Cavalcante; Zoran Utkovski; Slawomir Stanczak
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3822
ER -
R.L.G Cavalcante, Zoran Utkovski, Slawomir Stanczak. (2018). Set-Theoretic Learning for Detection in Cell-Less C-RAN Systems. IEEE SigPort. http://sigport.org/3822
R.L.G Cavalcante, Zoran Utkovski, Slawomir Stanczak, 2018. Set-Theoretic Learning for Detection in Cell-Less C-RAN Systems. Available at: http://sigport.org/3822.
R.L.G Cavalcante, Zoran Utkovski, Slawomir Stanczak. (2018). "Set-Theoretic Learning for Detection in Cell-Less C-RAN Systems." Web.
1. R.L.G Cavalcante, Zoran Utkovski, Slawomir Stanczak. Set-Theoretic Learning for Detection in Cell-Less C-RAN Systems [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3822

A Fixed-Point Iteration for Steady-State Analysis of Water Distribution Networks

Paper Details

Authors:
M. Bazrafshan, N. Gatsis, M. Giacomoni, and A. F. Taha
Submitted On:
28 November 2018 - 11:11am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Presentation.pdf

(418 downloads)

Subscribe

[1] M. Bazrafshan, N. Gatsis, M. Giacomoni, and A. F. Taha, "A Fixed-Point Iteration for Steady-State Analysis of Water Distribution Networks", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3821. Accessed: Dec. 16, 2018.
@article{3821-18,
url = {http://sigport.org/3821},
author = {M. Bazrafshan; N. Gatsis; M. Giacomoni; and A. F. Taha },
publisher = {IEEE SigPort},
title = {A Fixed-Point Iteration for Steady-State Analysis of Water Distribution Networks},
year = {2018} }
TY - EJOUR
T1 - A Fixed-Point Iteration for Steady-State Analysis of Water Distribution Networks
AU - M. Bazrafshan; N. Gatsis; M. Giacomoni; and A. F. Taha
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3821
ER -
M. Bazrafshan, N. Gatsis, M. Giacomoni, and A. F. Taha. (2018). A Fixed-Point Iteration for Steady-State Analysis of Water Distribution Networks. IEEE SigPort. http://sigport.org/3821
M. Bazrafshan, N. Gatsis, M. Giacomoni, and A. F. Taha, 2018. A Fixed-Point Iteration for Steady-State Analysis of Water Distribution Networks. Available at: http://sigport.org/3821.
M. Bazrafshan, N. Gatsis, M. Giacomoni, and A. F. Taha. (2018). "A Fixed-Point Iteration for Steady-State Analysis of Water Distribution Networks." Web.
1. M. Bazrafshan, N. Gatsis, M. Giacomoni, and A. F. Taha. A Fixed-Point Iteration for Steady-State Analysis of Water Distribution Networks [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3821

On The Utility of Conditional Generation Based Mutual Information For Characterizing Adversarial Subspaces

Paper Details

Authors:
Pei-hsuan Lu, Pin-yu Chen, Chia-mu Yu
Submitted On:
8 December 2018 - 5:11am
Short Link:
Type:
Event:
Document Year:
Cite

Document Files

On The Utility of Conditional Generation Based Mutual Information For Characterizing Adversarial Subspaces.pdf

(10 downloads)

Subscribe

[1] Pei-hsuan Lu, Pin-yu Chen, Chia-mu Yu, "On The Utility of Conditional Generation Based Mutual Information For Characterizing Adversarial Subspaces", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3820. Accessed: Dec. 16, 2018.
@article{3820-18,
url = {http://sigport.org/3820},
author = {Pei-hsuan Lu; Pin-yu Chen; Chia-mu Yu },
publisher = {IEEE SigPort},
title = {On The Utility of Conditional Generation Based Mutual Information For Characterizing Adversarial Subspaces},
year = {2018} }
TY - EJOUR
T1 - On The Utility of Conditional Generation Based Mutual Information For Characterizing Adversarial Subspaces
AU - Pei-hsuan Lu; Pin-yu Chen; Chia-mu Yu
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3820
ER -
Pei-hsuan Lu, Pin-yu Chen, Chia-mu Yu. (2018). On The Utility of Conditional Generation Based Mutual Information For Characterizing Adversarial Subspaces. IEEE SigPort. http://sigport.org/3820
Pei-hsuan Lu, Pin-yu Chen, Chia-mu Yu, 2018. On The Utility of Conditional Generation Based Mutual Information For Characterizing Adversarial Subspaces. Available at: http://sigport.org/3820.
Pei-hsuan Lu, Pin-yu Chen, Chia-mu Yu. (2018). "On The Utility of Conditional Generation Based Mutual Information For Characterizing Adversarial Subspaces." Web.
1. Pei-hsuan Lu, Pin-yu Chen, Chia-mu Yu. On The Utility of Conditional Generation Based Mutual Information For Characterizing Adversarial Subspaces [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3820

Pages