Adversarial Example Detection

Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems

Authors: Yue Gao, Ilia Shumailov, Kassem Fawaz | Published: 2021-04-18 | Updated: 2022-06-19
Adversarial Example
Adversarial Example Detection
Defense Mechanism

Sparse Coding Frontend for Robust Neural Networks

Authors: Can Bakiskan, Metehan Cekic, Ahmet Dundar Sezer, Upamanyu Madhow | Published: 2021-04-12
Poisoning
Adversarial Example Detection
Defense Mechanism

Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain

Authors: Jinyu Tian, Jiantao Zhou, Yuanman Li, Jia Duan | Published: 2021-03-07
Attack Scenario Analysis
Adversarial Example Detection
Adversarial Learning

Identifying Untrustworthy Predictions in Neural Networks by Geometric Gradient Analysis

Authors: Leo Schwinn, An Nguyen, René Raab, Leon Bungert, Daniel Tenbrinck, Dario Zanca, Martin Burger, Bjoern Eskofier | Published: 2021-02-24
Model Performance Evaluation
Trust Evaluation Module
Adversarial Example Detection

Adversarial Robustness with Non-uniform Perturbations

Authors: Ecenaz Erdemir, Jeffrey Bickford, Luca Melis, Sergul Aydore | Published: 2021-02-24 | Updated: 2021-10-29
Malware Detection Method
Adversarial Example
Adversarial Example Detection

Adversarially Robust Learning with Unknown Perturbation Sets

Authors: Omar Montasser, Steve Hanneke, Nathan Srebro | Published: 2021-02-03
Model Performance Evaluation
Adversarial Example Detection
Adversarial Training

ATRO: Adversarial Training with a Rejection Option

Authors: Masahiro Kato, Zhenghang Cui, Yoshihiro Fukuhara | Published: 2020-10-24
Adversarial Example
Adversarial Example Detection
Machine Learning Algorithm

ATOM: Robustifying Out-of-distribution Detection Using Outlier Mining

Authors: Jiefeng Chen, Yixuan Li, Xi Wu, Yingyu Liang, Somesh Jha | Published: 2020-06-26 | Updated: 2021-06-30
Out-of-Distribution Detection
Adversarial Example Detection
Adversarial attack

Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?

Authors: Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu | Published: 2020-06-26 | Updated: 2022-07-28
Backdoor Attack
Adversarial Example Detection
Adversarial attack

Adversarial Feature Desensitization

Authors: Pouya Bashivan, Reza Bayat, Adam Ibrahim, Kartik Ahuja, Mojtaba Faramarzi, Touraj Laleh, Blake Aaron Richards, Irina Rish | Published: 2020-06-08 | Updated: 2022-01-04
Algorithm
Adversarial Example
Adversarial Example Detection