Literature Database

Featurized Bidirectional GAN: Adversarial Defense via Adversarially Learned Semantic Inference

Authors: Ruying Bao, Sihang Liang, Qingcan Wang | Published: 2018-05-21 | Updated: 2018-09-29
Certified Robustness
Adversarial Attack Detection
Watermark Design

Targeted Adversarial Examples for Black Box Audio Systems

Authors: Rohan Taori, Amog Kamsetty, Brenton Chu, Nikita Vemuri | Published: 2018-05-20 | Updated: 2019-08-20
Certified Robustness
Adversarial Attack Detection
Speech Recognition System

Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks

Authors: Jiefeng Chen, Xi Wu, Vaibhav Rastogi, Yingyu Liang, Somesh Jha | Published: 2018-05-20 | Updated: 2019-10-03
Data Preprocessing
Model Robustness
Model Extraction Attack

Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models

Authors: Pouya Samangouei, Maya Kabkab, Rama Chellappa | Published: 2018-05-17 | Updated: 2018-05-18
Certified Robustness
Information Security
Adversarial Attack Detection

Gradient-Leaks: Understanding and Controlling Deanonymization in Federated Learning

Authors: Tribhuvanesh Orekondy, Seong Joon Oh, Yang Zhang, Bernt Schiele, Mario Fritz | Published: 2018-05-15 | Updated: 2020-09-13
Privacy-Preserving Machine Learning
Poisoning
User Behavior Analysis

Knowledge Distillation with Adversarial Samples Supporting Decision Boundary

Authors: Byeongho Heo, Minsik Lee, Sangdoo Yun, Jin Young Choi | Published: 2018-05-15 | Updated: 2018-12-14
Adversarial Example
Adversarial Attack Detection
Knowledge Distillation

Detecting Adversarial Samples for Deep Neural Networks through Mutation Testing

Authors: Jingyi Wang, Jun Sun, Peixin Zhang, Xinyu Wang | Published: 2018-05-14 | Updated: 2018-05-17
Certified Robustness
Adversarial Example
Adversarial Attack Detection

AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning

Authors: Jinyuan Jia, Neil Zhenqiang Gong | Published: 2018-05-13 | Updated: 2020-04-13
Privacy Protection Mechanism
Membership Inference
Loss Function

Curriculum Adversarial Training

Authors: Qi-Zhi Cai, Min Du, Chang Liu, Dawn Song | Published: 2018-05-13
Data Curation
Model Robustness
Adversarial Learning

Under the Underground: Predicting Private Interactions in Underground Forums

Authors: Rebekah Overdorf, Carmela Troncoso, Rachel Greenstadt, Damon McCoy | Published: 2018-05-11
Darknet Analysis
Membership Inference
User Behavior Analysis