Certified Robustness

Sequential Attacks on Agents for Long-Term Adversarial Goals

Authors: Edgar Tretschk, Seong Joon Oh, Mario Fritz | Published: 2018-05-31 | Updated: 2018-07-05
Certified Robustness
Reinforcement Learning
Adversarial Transferability

Adversarial Noise Attacks of Deep Learning Architectures — Stability Analysis via Sparse Modeled Signals

Authors: Yaniv Romano, Aviad Aberdam, Jeremias Sulam, Michael Elad | Published: 2018-05-29 | Updated: 2019-08-05
Sparsity Optimization
Certified Robustness
Watermark Evaluation

Detecting Deceptive Reviews using Generative Adversarial Networks

Authors: Hojjat Aghakhani, Aravind Machiry, Shirin Nilizadeh, Christopher Kruegel, Giovanni Vigna | Published: 2018-05-25
Backdoor Detection
Certified Robustness
Deception Detection

Adversarial Attacks on Neural Networks for Graph Data

Authors: Daniel Zügner, Amir Akbarnejad, Stephan Günnemann | Published: 2018-05-21 | Updated: 2021-12-09
Poisoning
Certified Robustness
Adversarial Attack Detection

Featurized Bidirectional GAN: Adversarial Defense via Adversarially Learned Semantic Inference

Authors: Ruying Bao, Sihang Liang, Qingcan Wang | Published: 2018-05-21 | Updated: 2018-09-29
Certified Robustness
Adversarial Attack Detection
Watermark Design

Targeted Adversarial Examples for Black Box Audio Systems

Authors: Rohan Taori, Amog Kamsetty, Brenton Chu, Nikita Vemuri | Published: 2018-05-20 | Updated: 2019-08-20
Certified Robustness
Adversarial Attack Detection
Speech Recognition System

Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models

Authors: Pouya Samangouei, Maya Kabkab, Rama Chellappa | Published: 2018-05-17 | Updated: 2018-05-18
Certified Robustness
Information Security
Adversarial Attack Detection

Detecting Adversarial Samples for Deep Neural Networks through Mutation Testing

Authors: Jingyi Wang, Jun Sun, Peixin Zhang, Xinyu Wang | Published: 2018-05-14 | Updated: 2018-05-17
Certified Robustness
Adversarial Example
Adversarial Attack Detection

How Robust are Deep Neural Networks?

Authors: Biswa Sengupta, Karl J. Friston | Published: 2018-04-30
Certified Robustness
Deep Learning-Based IDS
Watermarking Technology

Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers

Authors: Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach | Published: 2018-04-23 | Updated: 2020-10-03
Query Generation Method
Certified Robustness
Adversarial Attack Methods