Skip to main content

Showing 1–22 of 22 results for author: Guesmi, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.19613  [pdf, other

    cs.CV

    TESSER: Transfer-Enhancing Adversarial Attacks from Vision Transformers via Spectral and Semantic Regularization

    Authors: Amira Guesmi, Bassem Ouni, Muhammad Shafique

    Abstract: Adversarial transferability remains a critical challenge in evaluating the robustness of deep neural networks. In security-critical applications, transferability enables black-box attacks without access to model internals, making it a key concern for real-world adversarial threat assessment. While Vision Transformers (ViTs) have demonstrated strong adversarial performance, existing attacks often f… ▽ More

    Submitted 26 May, 2025; originally announced May 2025.

  2. arXiv:2503.07058  [pdf, other

    cs.CV

    Breaking the Limits of Quantization-Aware Defenses: QADT-R for Robustness Against Patch-Based Adversarial Attacks in QNNs

    Authors: Amira Guesmi, Bassem Ouni, Muhammad Shafique

    Abstract: Quantized Neural Networks (QNNs) have emerged as a promising solution for reducing model size and computational costs, making them well-suited for deployment in edge and resource-constrained environments. While quantization is known to disrupt gradient propagation and enhance robustness against pixel-level adversarial attacks, its effectiveness against patch-based adversarial attacks remains large… ▽ More

    Submitted 10 March, 2025; originally announced March 2025.

  3. arXiv:2411.15246  [pdf, other

    cs.CR

    Exploring the Robustness and Transferability of Patch-Based Adversarial Attacks in Quantized Neural Networks

    Authors: Amira Guesmi, Bassem Ouni, Muhammad Shafique

    Abstract: Quantized neural networks (QNNs) are increasingly used for efficient deployment of deep learning models on resource-constrained platforms, such as mobile devices and edge computing systems. While quantization reduces model size and computational demands, its impact on adversarial robustness-especially against patch-based attacks-remains inadequately addressed. Patch-based attacks, characterized by… ▽ More

    Submitted 25 February, 2025; v1 submitted 22 November, 2024; originally announced November 2024.

  4. arXiv:2409.20426  [pdf, other

    cs.CV

    Navigating Threats: A Survey of Physical Adversarial Attacks on LiDAR Perception Systems in Autonomous Vehicles

    Authors: Amira Guesmi, Muhammad Shafique

    Abstract: Autonomous vehicles (AVs) rely heavily on LiDAR (Light Detection and Ranging) systems for accurate perception and navigation, providing high-resolution 3D environmental data that is crucial for object detection and classification. However, LiDAR systems are vulnerable to adversarial attacks, which pose significant challenges to the safety and robustness of AVs. This survey presents a thorough revi… ▽ More

    Submitted 30 September, 2024; originally announced September 2024.

  5. arXiv:2405.06278  [pdf, other

    cs.CV cs.CR

    Exploring the Interplay of Interpretability and Robustness in Deep Neural Networks: A Saliency-guided Approach

    Authors: Amira Guesmi, Nishant Suresh Aswani, Muhammad Shafique

    Abstract: Adversarial attacks pose a significant challenge to deploying deep learning models in safety-critical applications. Maintaining model robustness while ensuring interpretability is vital for fostering trust and comprehension in these models. This study investigates the impact of Saliency-guided Training (SGT) on model robustness, a technique aimed at improving the clarity of saliency maps to deepen… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

  6. arXiv:2405.03244  [pdf, other

    cs.LG

    Examining Changes in Internal Representations of Continual Learning Models Through Tensor Decomposition

    Authors: Nishant Suresh Aswani, Amira Guesmi, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Continual learning (CL) has spurred the development of several methods aimed at consolidating previous knowledge across sequential learning. Yet, the evaluations of these methods have primarily focused on the final output, such as changes in the accuracy of predicted classes, overlooking the issue of representational forgetting within the model. In this paper, we propose a novel representation-bas… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Journal ref: Proceedings of the 1st ContinualAI Unconference, 2023, PMLR 249:62-82, 2024

  7. arXiv:2403.11515  [pdf, other

    cs.CV cs.RO

    SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Bassem Ouni, Muhammad Shafique

    Abstract: Monocular depth estimation (MDE) has advanced significantly, primarily through the integration of convolutional neural networks (CNNs) and more recently, Transformers. However, concerns about their susceptibility to adversarial attacks have emerged, especially in safety-critical domains like autonomous driving and robotic navigation. Existing approaches for assessing CNN-based depth prediction met… ▽ More

    Submitted 5 August, 2024; v1 submitted 18 March, 2024; originally announced March 2024.

    Comments: arXiv admin note: text overlap with arXiv:2303.01351

  8. arXiv:2402.06249  [pdf, other

    cs.CV cs.CR

    Anomaly Unveiled: Securing Image Classification against Adversarial Patch Attacks

    Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Shafique

    Abstract: Adversarial patch attacks pose a significant threat to the practical deployment of deep learning systems. However, existing research primarily focuses on image pre-processing defenses, which often result in reduced classification accuracy for clean images and fail to effectively counter physically feasible attacks. In this paper, we investigate the behavior of adversarial patches as anomalies with… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

  9. arXiv:2311.12211  [pdf, other

    cs.CR

    DefensiveDR: Defending against Adversarial Patches using Dimensionality Reduction

    Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique

    Abstract: Adversarial patch-based attacks have shown to be a major deterrent towards the reliable use of machine learning models. These attacks involve the strategic modification of localized patches or specific image areas to deceive trained machine learning models. In this paper, we propose \textit{DefensiveDR}, a practical mechanism using a dimensionality reduction technique to thwart such patch-based at… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

  10. arXiv:2311.12084  [pdf, other

    cs.CR cs.CV

    ODDR: Outlier Detection & Dimension Reduction Based Defense Against Adversarial Patches

    Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique

    Abstract: Adversarial attacks present a significant challenge to the dependable deployment of machine learning models, with patch-based attacks being particularly potent. These attacks introduce adversarial perturbations in localized regions of an image, deceiving even well-trained models. In this paper, we propose Outlier Detection and Dimension Reduction (ODDR), a comprehensive defense strategy engineered… ▽ More

    Submitted 27 August, 2024; v1 submitted 20 November, 2023; originally announced November 2023.

  11. arXiv:2308.06173  [pdf, other

    cs.CR cs.AI cs.CV cs.LG cs.RO

    Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammed Shafique

    Abstract: In this paper, we present a comprehensive survey of the current trends focusing specifically on physical adversarial attacks. We aim to provide a thorough understanding of the concept of physical adversarial attacks, analyzing their key characteristics and distinguishing features. Furthermore, we explore the specific requirements and challenges associated with executing attacks in the physical wor… ▽ More

    Submitted 11 August, 2023; originally announced August 2023.

  12. arXiv:2308.03108  [pdf, other

    cs.CV cs.CR

    SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique

    Abstract: In this paper, we investigate the vulnerability of MDE to adversarial patches. We propose a novel \underline{S}tealthy \underline{A}dversarial \underline{A}ttacks on \underline{M}DE (SAAM) that compromises MDE by either corrupting the estimated distance or causing an object to seamlessly blend into its surroundings. Our experiments, demonstrate that the designed stealthy patch successfully causes… ▽ More

    Submitted 20 December, 2023; v1 submitted 6 August, 2023; originally announced August 2023.

  13. arXiv:2305.11618  [pdf, other

    cs.CR cs.CV

    DAP: A Dynamic Adversarial Patch for Evading Person Detectors

    Authors: Amira Guesmi, Ruitian Ding, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: Patch-based adversarial attacks were proven to compromise the robustness and reliability of computer vision systems. However, their conspicuous and easily detectable nature challenge their practicality in real-world setting. To address this, recent work has proposed using Generative Adversarial Networks (GANs) to generate naturalistic patches that may not attract human attention. However, such app… ▽ More

    Submitted 20 November, 2023; v1 submitted 19 May, 2023; originally announced May 2023.

  14. arXiv:2303.01819  [pdf, other

    cs.LG cs.CR cs.CV

    Exploring Machine Learning Privacy/Utility trade-off from a hyperparameters Lens

    Authors: Ayoub Arous, Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: Machine Learning (ML) architectures have been applied to several applications that involve sensitive data, where a guarantee of users' data privacy is required. Differentially Private Stochastic Gradient Descent (DPSGD) is the state-of-the-art method to train privacy-preserving models. However, DPSGD comes at a considerable accuracy loss leading to sub-optimal privacy/utility trade-offs. Towards i… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

  15. arXiv:2303.01734  [pdf, other

    cs.CV cs.CR

    AdvART: Adversarial Art for Camouflaged Object Detection Attacks

    Authors: Amira Guesmi, Ioan Marius Bilasco, Muhammad Shafique, Ihsen Alouani

    Abstract: Physical adversarial attacks pose a significant practical threat as it deceives deep learning systems operating in the real world by producing prominent and maliciously designed physical perturbations. Emphasizing the evaluation of naturalness is crucial in such attacks, as humans can readily detect and eliminate unnatural manipulations. To overcome this limitation, recent work has proposed levera… ▽ More

    Submitted 9 February, 2024; v1 submitted 3 March, 2023; originally announced March 2023.

  16. arXiv:2303.01351  [pdf, other

    cs.CV cs.RO

    APARATE: Adaptive Adversarial Patch for CNN-based Monocular Depth Estimation for Autonomous Navigation

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: In recent times, monocular depth estimation (MDE) has experienced significant advancements in performance, largely attributed to the integration of innovative architectures, i.e., convolutional neural networks (CNNs) and Transformers. Nevertheless, the susceptibility of these models to adversarial attacks has emerged as a noteworthy concern, especially in domains where safety and security are para… ▽ More

    Submitted 5 August, 2024; v1 submitted 2 March, 2023; originally announced March 2023.

  17. arXiv:2303.01338  [pdf, other

    cs.CV cs.CR

    AdvRain: Adversarial Raindrops to Attack Camera-based Smart Vision Systems

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Vision-based perception modules are increasingly deployed in many applications, especially autonomous vehicles and intelligent robots. These modules are being used to acquire information about the surroundings and identify obstacles. Hence, accurate detection and classification are essential to reach appropriate decisions and take appropriate and safe actions at all times. Current studies have dem… ▽ More

    Submitted 5 October, 2023; v1 submitted 2 March, 2023; originally announced March 2023.

  18. arXiv:2211.01182  [pdf, other

    cs.CR

    Defending with Errors: Approximate Computing for Robustness of Deep Neural Networks

    Authors: Amira Guesmi, Ihsen Alouani, Khaled N. Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael Abu-Ghazaleh

    Abstract: Machine-learning architectures, such as Convolutional Neural Networks (CNNs) are vulnerable to adversarial attacks: inputs crafted carefully to force the system output to a wrong label. Since machine-learning is being deployed in safety-critical and security-sensitive domains, such attacks may have catastrophic security and safety consequences. In this paper, we propose for the first time to use h… ▽ More

    Submitted 2 November, 2022; originally announced November 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2006.07700

  19. arXiv:2211.01112  [pdf, other

    cs.CR

    Adversarial Attack on Radar-based Environment Perception Systems

    Authors: Amira Guesmi, Ihsen Alouani

    Abstract: Due to their robustness to degraded capturing conditions, radars are widely used for environment perception, which is a critical task in applications like autonomous vehicles. More specifically, Ultra-Wide Band (UWB) radars are particularly efficient for short range settings as they carry rich information on the environment. Recent UWB-based systems rely on Machine Learning (ML) to exploit the ric… ▽ More

    Submitted 28 November, 2022; v1 submitted 2 November, 2022; originally announced November 2022.

  20. arXiv:2204.09514  [pdf, other

    cs.AR cs.CR cs.CV cs.DC cs.LG

    Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems

    Authors: Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique

    Abstract: The real-world use cases of Machine Learning (ML) have exploded over the past few years. However, the current computing infrastructure is insufficient to support all real-world applications and scenarios. Apart from high efficiency requirements, modern ML systems are expected to be highly reliable against hardware failures as well as secure against adversarial and IP stealing attacks. Privacy conc… ▽ More

    Submitted 18 April, 2022; originally announced April 2022.

    Comments: Appears at 40th IEEE VLSI Test Symposium (VTS 2022), 14 pages

  21. arXiv:2201.01621  [pdf, other

    cs.CR cs.LG

    ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints

    Authors: Amira Guesmi, Khaled N. Khasawneh, Nael Abu-Ghazaleh, Ihsen Alouani

    Abstract: Advances in deep learning have enabled a wide range of promising applications. However, these systems are vulnerable to Adversarial Machine Learning (AML) attacks; adversarially crafted perturbations to their inputs could cause them to misclassify. Several state-of-the-art adversarial attacks have demonstrated that they can reliably fool classifiers making these attacks a significant threat. Adver… ▽ More

    Submitted 5 January, 2022; originally announced January 2022.

    Comments: 12 pages

  22. Defensive Approximation: Securing CNNs using Approximate Computing

    Authors: Amira Guesmi, Ihsen Alouani, Khaled Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael Abu-Ghazaleh

    Abstract: In the past few years, an increasing number of machine-learning and deep learning structures, such as Convolutional Neural Networks (CNNs), have been applied to solving a wide range of real-life problems. However, these architectures are vulnerable to adversarial attacks. In this paper, we propose for the first time to use hardware-supported approximate computing to improve the robustness of machi… ▽ More

    Submitted 29 July, 2021; v1 submitted 13 June, 2020; originally announced June 2020.

    Comments: ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2021)