Adversarial Example Detection

One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy

Authors: Jingkang Wang, Ruoxi Jia, Gerald Friedland, Bo Li, Costas Spanos | Published: 2018-10-23
Robust Estimation
Adversarial Example Detection
Adversarial Transferability

A Training-based Identification Approach to VIN Adversarial Examples

Authors: Yingdi Wang, Wenjia Niu, Tong Chen, Yingxiao Xiang, Jingjing Liu, Gang Li, Jiqiang Liu | Published: 2018-10-18
Robustness Improvement Method
Adversarial Example Detection
Adversarial Attack Methods

DeepImageSpam: Deep Learning based Image Spam Detection

Authors: Amara Dinesh Kumar, Vinayakumar R, Soman KP | Published: 2018-10-03
Spam Classification Model
Adversarial Example Detection
Research Methodology

Structure-Preserving Transformation: Generating Diverse and Transferable Adversarial Examples

Authors: Dan Peng, Zizhan Zheng, Xiaofeng Zhang | Published: 2018-09-08 | Updated: 2018-12-22
Certified Robustness
Adversarial Example Detection
Adversarial Transferability

Are adversarial examples inevitable?

Authors: Ali Shafahi, W. Ronny Huang, Christoph Studer, Soheil Feizi, Tom Goldstein | Published: 2018-09-06 | Updated: 2020-02-03
Robustness Analysis
Adversarial Example
Adversarial Example Detection

HASP: A High-Performance Adaptive Mobile Security Enhancement Against Malicious Speech Recognition

Authors: Zirui Xu, Fuxun Yu, Chenchen Liu, Xiang Chen | Published: 2018-09-04
Robustness Improvement Method
Performance Evaluation
Adversarial Example Detection

MULDEF: Multi-model-based Defense Against Adversarial Examples for Neural Networks

Authors: Siwakorn Srisakaokul, Yuhao Zhang, Zexuan Zhong, Wei Yang, Tao Xie, Bo Li | Published: 2018-08-31 | Updated: 2019-07-27
Model Ensemble
Adversarial Example Detection
Adversarial Learning

Security and Privacy Issues in Deep Learning

Authors: Ho Bae, Jaehee Jang, Dahuin Jung, Hyemi Jang, Heonseok Ha, Hyungyu Lee, Sungroh Yoon | Published: 2018-07-31 | Updated: 2021-03-10
Differential Privacy
Adversarial Example Detection
Adversarial attack

A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks

Authors: Kimin Lee, Kibok Lee, Honglak Lee, Jinwoo Shin | Published: 2018-07-10 | Updated: 2018-10-27
Model Evaluation
Adversarial Example Detection
Adversarial Learning

Detection based Defense against Adversarial Examples from the Steganalysis Point of View

Authors: Jiayang Liu, Weiming Zhang, Yiwei Zhang, Dongdong Hou, Yujia Liu, Hongyue Zha, Nenghai Yu | Published: 2018-06-21 | Updated: 2018-12-24
Cybersecurity
Adversarial Example Detection
Adversarial Training