Attack Evaluation

Attacking Vision-based Perception in End-to-End Autonomous Driving Models

Authors: Adith Boloor, Karthik Garimella, Xin He, Christopher Gill, Yevgeniy Vorobeychik, Xuan Zhang | Published: 2019-10-02
Attack Evaluation
Adversarial Attack Methods
Vehicle Hijacking Attack

Machine-Learning Techniques for Detecting Attacks in SDN

Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut | Published: 2019-10-02
Cyber Threat
Attack Evaluation
Machine Learning Algorithm

Analyzing and Improving Neural Networks by Generating Semantic Counterexamples through Differentiable Rendering

Authors: Lakshya Jain, Varun Chandrasekaran, Uyeong Jang, Wilson Wu, Andrew Lee, Andy Yan, Steven Chen, Somesh Jha, Sanjit A. Seshia | Published: 2019-10-02 | Updated: 2020-07-17
Semantic Information Extraction
Attack Evaluation
Adversarial Attack Methods

Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network

Authors: Shisrut Rawat, Aishwarya Srinivasan, Vinayakumar R | Published: 2019-10-01
Model Design and Accuracy
Attack Evaluation
Machine Learning Algorithm

Cross-Layer Strategic Ensemble Defense Against Adversarial Examples

Authors: Wenqi Wei, Ling Liu, Margaret Loper, Ka-Ho Chow, Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2019-10-01
Poisoning
Attack Evaluation
Adversarial Example

Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks

Authors: Jiadong Lin, Chuanbiao Song, Kun He, Liwei Wang, John E. Hopcroft | Published: 2019-08-17 | Updated: 2020-02-03
Robustness Improvement Method
Attack Evaluation
Adversarial Attack Methods

Adversarial shape perturbations on 3D point clouds

Authors: Daniel Liu, Ronald Yu, Hao Su | Published: 2019-08-16 | Updated: 2020-10-23
Robustness Improvement Method
Attack Evaluation
Adversarial Attack Methods

BlurNet: Defense by Filtering the Feature Maps

Authors: Ravi Raju, Mikko Lipasti | Published: 2019-08-06 | Updated: 2020-05-16
Robustness Improvement Method
Attack Evaluation
Adversarial Attack Methods

Model Agnostic Defence against Backdoor Attacks in Machine Learning

Authors: Sakshi Udeshi, Shanshan Peng, Gerald Woo, Lionell Loh, Louth Rawshan, Sudipta Chattopadhyay | Published: 2019-08-06 | Updated: 2022-03-31
Backdoor Attack
Attack Evaluation
Content Specialized for Toxicity Attacks

A principled approach for generating adversarial images under non-smooth dissimilarity metrics

Authors: Aram-Alexandre Pooladian, Chris Finlay, Tim Hoheisel, Adam Oberman | Published: 2019-08-05 | Updated: 2019-10-08
Robustness Improvement Method
Attack Evaluation
Adversarial Attack Methods