What factors have you considered in your discussion

Assignment Help Computer Engineering
Reference no: EM133284317

AI for Smarter Cyber-Security

Question 1. This part of the assignment is related to the Generative Adversarial Networks (GANs) for image generation.

Select and download a working GAN model (Python code) from the Keras website for the generation of human face images based on the Celebrity Dataset.

1. Run the complete GAN model in a CPU environment. Note the time it takes to fully execute one epoch of the model on the CPU. You must present the screenshots as evidence of the model running on your machine indicating the execution time.

2. Run the complete GAN model in a GPU environment. Note the time it takes to fully execute one epoch of the model on the GPU. You must present the screenshots as evidence of the model running on your machine indicating the execution time.

3. Discuss in your own words the processing time difference between the above 2 processing environments. Which processing environment has performed better and why? How much total time will be needed to train the GAN for 100 epochs on CPU and GPU environments?

4. Provide screenshots of the Generator and Discriminator models of your overall GAN model. Briefly discuss the roles of the Generator and Discriminator models and what type of layers enable them to perform these roles.

Question 2. This part of the assignment is related to Adversarial Machine Learning (AML). Download the following article by Pouya et.al. from the web:

"DEFENSE-GAN: PROTECTING CLASSIFIERS AGAINST ADVERSARIAL ATTACKS USING GENERATIVE MODELS Pouya Samangouei, Maya Kabkab, and Rama Chellappa"

1. Briefly discuss in your own words the Defence-GAN system that the authors have proposed in their article. Provide the relevant block diagram of the system.

2. Briefly discuss in your own words why the proposed system is for 'Defence' purposes and not for Attack Purposes.

3. Briefly discuss in your own words the performance achieved by their proposed system on the MNIST dataset under FGSM Black-Box attack. What factors have you considered in your discussion and why?

Reference no: EM133284317

Questions Cloud

What are some of the typical challenges for hrm : What are some of the typical challenges for HRM in internationalized SMEs? Describe the development phases of an M&A and the respective HR implications
What is one more opportunity your hr department has : What is one more opportunity your HR department has? You mentioned your strength is recruiting talent but a weakness is keeping talent
Least dangerous branch : Alexander Hamilton argued the judiciary is the "least dangerous branch." Do you agree or disagree? Why?
Discuss the three stages of interphase : Discuss the three stages of interphase. Explain the difference in a proto-oncogene and a tumor suppressor gene.
What factors have you considered in your discussion : CYSE2003 AI for Smarter Cyber-Security, Yorkville University discuss in your own words the Defence-GAN system that the authors have proposed in their article
California over so-called sanctuary laws : Supporting Trump administration's lawsuit against California over so-called sanctuary laws that state passed in 2017 to limit its role in immigration enforcemen
Make an outline of a training and development plan : Given the sales strategy, make an outline of a training and development plan to help the sales team implement the strategy and explain
Describe enterprise system and its benefits to organisation : Describe enterprise system and its benefits to an organisation. Select Amazon manufacturing and production in business processes
Define human resource information management system : Define and describe a Human Resource Information Management System (HRIMS). How does a HRIMS contribute to operational and business objectives

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss the pros and cons of one method of transmission

What concerns should be understood about data communications being sent over wireless networks? Discuss the pros and cons of one method of transmission.

  Create a bookfactory to construct the required object

Create a BookFactory to construct the required object and use the enum Books. Use virtual functions to read and print the data.

  Create application for an "automotive repair shop"

Create Visual Basic.NET application for an "Automotive Repair Shop". Below are the needed.

  How many gas stations are there in the united states

How many gas stations are there in the United States? How many people fly in and out of LaGuardia Airport every day?

  What are different kinds of views that you can make of sound

The Media Tools application sound editor allows you to record sounds and view sounds. What are the different kinds of views that you can make of a sound?

  Determine which os the company should implement

Imagine that you are a systems architect at a medium-sized publishing company with 90 employees and determine which OS the company should implement

  What are the strengths of the tool belt approach

What are the strengths of the "tool belt" approach to digital forensics? Are there any weaknesses? Discuss these questions thoroughly in your Conference response, and respond to at least one other student's original post in a way that adds to the..

  Write algebraic expressions using variables x and y

Generate data sets (sample size n=10) for each expression (A-D) with randomly generated, normally distributed residuals/errors.

  Write a program to perform the given operation

The Last National Bank has two branches, each of which uses a sequential containing a summary of customers' account. Write a program to perform this operation.

  Compliance with billing and coding policies

Identify the responsible department for ensuring compliance with billing and coding policies.

  Provide runtime analysis of your program

Provide runtime analysis of your program. As discussed in lecture, Big-O notation provides us a way to evaluate the performance of our code.

  Describe the main elements of sarbanes-oxley act

From the e-Activity, describe the main elements of SOX and identify the controls organizations need to implement to be compliant with SOX.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd