Iv

I.C. van der Blij

2 records found

Authored

Exploiting neuron activation values for creating adversarial examples

Utilization of intermediate network information in genetic algorithms

The increasing usage of neural networks forms a threat to the cyber security of the system that uses the network, and unfortunately adversaries use this vulnerability to attack the system with adversarial examples. As neural networks can have complex structures with tens of thou ...
During this project we were asked to explore the possibilities and limitations of creating a virtual therapist that can help people who suffer from a sleeping disorder. In order to answer this question, the goal of the project was to make such a therapist ourselves.

The ...