Vulnerability of Adversarial Examples

A Survey of Black-Box Adversarial Attacks on Computer Vision Models

Authors: Siddhant Bhambri, Sumanyu Muku, Avinash Tulasi, Arun Balaji Buduru | Published: 2019-12-03 | Updated: 2020-02-07
Poisoning
Vulnerability of Adversarial Examples
Effectiveness Analysis of Defense Methods

A Method for Computing Class-wise Universal Adversarial Perturbations

Authors: Tejus Gupta, Abhishek Sinha, Nupur Kumari, Mayank Singh, Balaji Krishnamurthy | Published: 2019-12-01
Adversarial Example
Vulnerability of Adversarial Examples
Deep Learning

Achieving Verified Robustness to Symbol Substitutions via Interval Bound Propagation

Authors: Po-Sen Huang, Robert Stanforth, Johannes Welbl, Chris Dyer, Dani Yogatama, Sven Gowal, Krishnamurthy Dvijotham, Pushmeet Kohli | Published: 2019-09-03 | Updated: 2019-12-20
Improvement of Learning
Adversarial Example
Vulnerability of Adversarial Examples

Metric Learning for Adversarial Robustness

Authors: Chengzhi Mao, Ziyuan Zhong, Junfeng Yang, Carl Vondrick, Baishakhi Ray | Published: 2019-09-03 | Updated: 2019-10-28
Poisoning
Improvement of Learning
Vulnerability of Adversarial Examples

Minimally distorted Adversarial Examples with a Fast Adaptive Boundary Attack

Authors: Francesco Croce, Matthias Hein | Published: 2019-07-03 | Updated: 2020-07-20
Poisoning
Vulnerability of Adversarial Examples
Adversarial attack

Identifying Classes Susceptible to Adversarial Attacks

Authors: Rangeet Pan, Md Johirul Islam, Shibbir Ahmed, Hridesh Rajan | Published: 2019-05-30
Vulnerability of Adversarial Examples
Adversarial Attack Methods
Deep Learning

Bandlimiting Neural Networks Against Adversarial Attacks

Authors: Yuping Lin, Kasra Ahmadi K. A., Hui Jiang | Published: 2019-05-30
Poisoning
Vulnerability of Adversarial Examples
Deep Learning

Generalizable Adversarial Attacks with Latent Variable Perturbation Modelling

Authors: Avishek Joey Bose, Andre Cianflone, William L. Hamilton | Published: 2019-05-26 | Updated: 2020-01-20
Impact of Generalization
Adversarial Example
Vulnerability of Adversarial Examples

Purifying Adversarial Perturbation with Adversarially Trained Auto-encoders

Authors: Hebi Li, Qi Xiao, Shixin Tian, Jin Tian | Published: 2019-05-26
Attack Type
Vulnerability of Adversarial Examples
Machine Learning Method

Adversarial Distillation for Ordered Top-k Attacks

Authors: Zekun Zhang, Tianfu Wu | Published: 2019-05-25
Adversarial Example
Vulnerability of Adversarial Examples
Machine Learning Method