Search Results for author: Christian Berghoff

Found 5 papers, 1 papers with code

Detecting Backdoor Poisoning Attacks on Deep Neural Networks by Heatmap Clustering

1 code implementation27 Apr 2022 Lukas Schulth, Christian Berghoff, Matthias Neu

We compare this method with a similar method, called Activation Clustering, which also uses $k$-means clustering but applies it on the activation of certain hidden layers of the neural network as input.

Clustering

Robustness testing of AI systems: A case study for traffic sign recognition

no code implementations13 Aug 2021 Christian Berghoff, Pavol Bielik, Matthias Neu, Petar Tsankov, Arndt von Twickel

In the last years, AI systems, in particular neural networks, have seen a tremendous increase in performance, and they are now used in a broad range of applications.

Autonomous Driving Traffic Sign Recognition

Protecting the integrity of the training procedure of neural networks

no code implementations14 May 2020 Christian Berghoff

Due to significant improvements in performance in recent years, neural networks are currently used for an ever-increasing number of applications.

Vulnerabilities of Connectionist AI Applications: Evaluation and Defence

no code implementations18 Mar 2020 Christian Berghoff, Matthias Neu, Arndt von Twickel

This article deals with the IT security of connectionist artificial intelligence (AI) applications, focusing on threats to integrity, one of the three IT security goals.

Cannot find the paper you are looking for? You can Submit a new open access paper.