Clustering
Adversarial vs Non Adversarial
Kishor Datta Gupta
Data
Dataset MNIST
10000 Clean images from 10 class
10000 FGSM attack method from 10 class
Data extraction method: PCA
Clustering Method:
• K-Means
• LDA
• T-SNE
Clean
Adversarial
Clean
Adversarial
Clean
Adversarial
Clean
Adversarial

More Related Content

PPTX
Adversarial Attacks and Defense
PPTX
GAN introduction.pptx
PPTX
Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...
PPTX
A safer approach to build recommendation systems on unidentifiable data
PPTX
Who is responsible for adversarial defense
PPTX
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...
PPTX
Zero shot learning
PPTX
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...
Adversarial Attacks and Defense
GAN introduction.pptx
Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...
A safer approach to build recommendation systems on unidentifiable data
Who is responsible for adversarial defense
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...
Zero shot learning
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...

More from Kishor Datta Gupta (20)

PPTX
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
PPTX
Machine learning in computer security
PPTX
Policy Based reinforcement Learning for time series Anomaly detection
PPTX
Cyber intrusion
PPTX
understanding the pandemic through mining covid news using natural language p...
PPTX
Different representation space for MNIST digit
PPTX
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...
PPTX
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
PPTX
Adversarial Input Detection Using Image Processing Techniques (IPT)
PPTX
Basic digital image concept
PPTX
An empirical study on algorithmic bias (aiml compsac2020)
PPTX
Hybrid pow-pos-based-system against majority attack-in-cryptocurrency system ...
PPTX
Shamir secret sharing: Alternative of hashing for authentication
PPTX
A Genetic Algorithm Approach to Optimize Dispatching for A Micro-grid Energy ...
PPTX
Multi level ransomware analysis MALCON 2019 conference
PPTX
COMXAI A tool to explain AI USING FAULT LOCATION
PPTX
Time expired ledger for File access blockchain
PPTX
BigData Computing For WebSite Classifier
PPTX
Performance evaluation of cloud-based log file analysis with Apache Hadoop an...
PPTX
Stylometry In Authentication
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
Machine learning in computer security
Policy Based reinforcement Learning for time series Anomaly detection
Cyber intrusion
understanding the pandemic through mining covid news using natural language p...
Different representation space for MNIST digit
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Adversarial Input Detection Using Image Processing Techniques (IPT)
Basic digital image concept
An empirical study on algorithmic bias (aiml compsac2020)
Hybrid pow-pos-based-system against majority attack-in-cryptocurrency system ...
Shamir secret sharing: Alternative of hashing for authentication
A Genetic Algorithm Approach to Optimize Dispatching for A Micro-grid Energy ...
Multi level ransomware analysis MALCON 2019 conference
COMXAI A tool to explain AI USING FAULT LOCATION
Time expired ledger for File access blockchain
BigData Computing For WebSite Classifier
Performance evaluation of cloud-based log file analysis with Apache Hadoop an...
Stylometry In Authentication
Ad

Recently uploaded (20)

PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PDF
Design Guidelines and solutions for Plastics parts
PDF
Visual Aids for Exploratory Data Analysis.pdf
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PDF
Soil Improvement Techniques Note - Rabbi
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPTX
Management Information system : MIS-e-Business Systems.pptx
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
Abrasive, erosive and cavitation wear.pdf
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Design Guidelines and solutions for Plastics parts
Visual Aids for Exploratory Data Analysis.pdf
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
distributed database system" (DDBS) is often used to refer to both the distri...
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
Soil Improvement Techniques Note - Rabbi
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
"Array and Linked List in Data Structures with Types, Operations, Implementat...
Module 8- Technological and Communication Skills.pptx
Exploratory_Data_Analysis_Fundamentals.pdf
Management Information system : MIS-e-Business Systems.pptx
Fundamentals of safety and accident prevention -final (1).pptx
Abrasive, erosive and cavitation wear.pdf
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
Ad

Clustering report