What factors have you considered in your discussion

Assignment Help Computer Engineering
Reference no: EM133284317

AI for Smarter Cyber-Security

Question 1. This part of the assignment is related to the Generative Adversarial Networks (GANs) for image generation.

Select and download a working GAN model (Python code) from the Keras website for the generation of human face images based on the Celebrity Dataset.

1. Run the complete GAN model in a CPU environment. Note the time it takes to fully execute one epoch of the model on the CPU. You must present the screenshots as evidence of the model running on your machine indicating the execution time.

2. Run the complete GAN model in a GPU environment. Note the time it takes to fully execute one epoch of the model on the GPU. You must present the screenshots as evidence of the model running on your machine indicating the execution time.

3. Discuss in your own words the processing time difference between the above 2 processing environments. Which processing environment has performed better and why? How much total time will be needed to train the GAN for 100 epochs on CPU and GPU environments?

4. Provide screenshots of the Generator and Discriminator models of your overall GAN model. Briefly discuss the roles of the Generator and Discriminator models and what type of layers enable them to perform these roles.

Question 2. This part of the assignment is related to Adversarial Machine Learning (AML). Download the following article by Pouya et.al. from the web:

"DEFENSE-GAN: PROTECTING CLASSIFIERS AGAINST ADVERSARIAL ATTACKS USING GENERATIVE MODELS Pouya Samangouei, Maya Kabkab, and Rama Chellappa"

1. Briefly discuss in your own words the Defence-GAN system that the authors have proposed in their article. Provide the relevant block diagram of the system.

2. Briefly discuss in your own words why the proposed system is for 'Defence' purposes and not for Attack Purposes.

3. Briefly discuss in your own words the performance achieved by their proposed system on the MNIST dataset under FGSM Black-Box attack. What factors have you considered in your discussion and why?

Reference no: EM133284317

Questions Cloud

What are some of the typical challenges for hrm : What are some of the typical challenges for HRM in internationalized SMEs? Describe the development phases of an M&A and the respective HR implications
What is one more opportunity your hr department has : What is one more opportunity your HR department has? You mentioned your strength is recruiting talent but a weakness is keeping talent
Least dangerous branch : Alexander Hamilton argued the judiciary is the "least dangerous branch." Do you agree or disagree? Why?
Discuss the three stages of interphase : Discuss the three stages of interphase. Explain the difference in a proto-oncogene and a tumor suppressor gene.
What factors have you considered in your discussion : CYSE2003 AI for Smarter Cyber-Security, Yorkville University discuss in your own words the Defence-GAN system that the authors have proposed in their article
California over so-called sanctuary laws : Supporting Trump administration's lawsuit against California over so-called sanctuary laws that state passed in 2017 to limit its role in immigration enforcemen
Make an outline of a training and development plan : Given the sales strategy, make an outline of a training and development plan to help the sales team implement the strategy and explain
Describe enterprise system and its benefits to organisation : Describe enterprise system and its benefits to an organisation. Select Amazon manufacturing and production in business processes
Define human resource information management system : Define and describe a Human Resource Information Management System (HRIMS). How does a HRIMS contribute to operational and business objectives

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd