Trigger Detection

Universal Decision-Based Black-Box Perturbations: Breaking Security-Through-Obscurity Defenses

Authors: Thomas A. Hogan, Bhavya Kailkhura | Published: 2018-11-09 | Updated: 2018-11-13
Trigger Detection
Malicious Content Generation
Attack Evaluation

SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters

Authors: Hassan Ali, Faiq Khalid, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-04 | Updated: 2020-05-15
Trigger Detection
Robustness Improvement
Attack Evaluation

RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications

Authors: Huan Zhang, Pengchuan Zhang, Cho-Jui Hsieh | Published: 2018-10-28 | Updated: 2019-02-27
Trigger Detection
Mathematical Analysis
Adversarial Learning

Towards Query Efficient Black-box Attacks: An Input-free Perspective

Authors: Yali Du, Meng Fang, Jinfeng Yi, Jun Cheng, Dacheng Tao | Published: 2018-09-09
Query Generation Method
Trigger Detection
Poisoning

Adversarial Attack Type I: Cheat Classifiers by Significant Changes

Authors: Sanli Tang, Xiaolin Huang, Mingjian Chen, Chengjin Sun, Jie Yang | Published: 2018-09-03 | Updated: 2019-07-22
Trigger Detection
Robustness Analysis
Adversarial Transferability

2P-DNN : Privacy-Preserving Deep Neural Networks Based on Homomorphic Cryptosystem

Authors: Qiang Zhu, Xixiang Lv | Published: 2018-07-23
Trigger Detection
Privacy Assessment
Model Design and Accuracy

Hardware Trojan Attacks on Neural Networks

Authors: Joseph Clements, Yingjie Lao | Published: 2018-06-14
Trigger Detection
Adversarial Example
Deep Learning Technology

PeerNets: Exploiting Peer Wisdom Against Adversarial Attacks

Authors: Jan Svoboda, Jonathan Masci, Federico Monti, Michael M. Bronstein, Leonidas Guibas | Published: 2018-05-31
Trigger Detection
Adversarial Example Detection
Deep Learning Method

Defending Against Adversarial Attacks by Leveraging an Entire GAN

Authors: Gokula Krishnan Santhanam, Paulina Grnarova | Published: 2018-05-27
Trigger Detection
Model Robustness
Adversarial Attack Detection

When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time

Authors: David J. Miller, Yulia Wang, George Kesidis | Published: 2017-12-18 | Updated: 2018-06-28
Trigger Detection
Adversarial Example
Adversarial Attack Methods