Attack Method

Feedback Learning for Improving the Robustness of Neural Networks

Authors: Chang Song, Zuoguan Wang, Hai Li | Published: 2019-09-12
Class Imbalance
Attack Method
Adversarial Example

Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences

Authors: Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang | Published: 2019-09-12
Sensor State Estimation
Attack Method
Machine Learning Application

Structural Robustness for Deep Learning Architectures

Authors: Carlos Lassance, Vincent Gripon, Jian Tang, Antonio Ortega | Published: 2019-09-11
Attack Method
Machine Learning Application
Machine Learning Method

Sparse and Imperceivable Adversarial Attacks

Authors: Francesco Croce, Matthias Hein | Published: 2019-09-11
Poisoning
Attack Method
Machine Learning Method

PDA: Progressive Data Augmentation for General Robustness of Deep Neural Networks

Authors: Hang Yu, Aishan Liu, Xianglong Liu, Gengchao Li, Ping Luo, Ran Cheng, Jichen Yang, Chongzhi Zhang | Published: 2019-09-11 | Updated: 2020-02-24
Poisoning
Model Robustness
Attack Method

Effectiveness of Adversarial Examples and Defenses for Malware Classification

Authors: Robert Podschwadt, Hassan Takabi | Published: 2019-09-10
Attack Method
Adversarial Example
Adaptive Adversarial Training

Poisoning Attacks with Generative Adversarial Nets

Authors: Luis Muñoz-González, Bjarne Pfitzner, Matteo Russo, Javier Carnerero-Cano, Emil C. Lupu | Published: 2019-06-18 | Updated: 2019-09-25
Backdoor Attack
Attack Method
Generative Adversarial Network

On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks

Authors: Masoumeh Shafieinejad, Jiaqi Wang, Nils Lukas, Xinda Li, Florian Kerschbaum | Published: 2019-06-18 | Updated: 2019-11-26
DNN IP Protection Method
Backdoor Attack
Attack Method

Membership Privacy for Machine Learning Models Through Knowledge Transfer

Authors: Virat Shejwalkar, Amir Houmansadr | Published: 2019-06-15 | Updated: 2020-12-31
Privacy Protection
Attack Method
Knowledge Transferability

Combatting Adversarial Attacks through Denoising and Dimensionality Reduction: A Cascaded Autoencoder Approach

Authors: Rajeev Sahay, Rehana Mahfuz, Aly El Gamal | Published: 2018-12-07
Attack Method
Adversarial Example Detection
Defense Effectiveness Analysis