Adversarial Example

Adversarial Attacks and Defenses on Graphs: A Review, A Tool and Empirical Studies

Authors: Wei Jin, Yaxin Li, Han Xu, Yiqi Wang, Shuiwang Ji, Charu Aggarwal, Jiliang Tang | Published: 2020-03-02 | Updated: 2020-12-12
Poisoning
Adversarial Example
Adversarial Learning

Gödel’s Sentence Is An Adversarial Example But Unsolvable

Authors: Xiaodong Qi, Lansheng Han | Published: 2020-02-25
Adversarial Example
Adversarial Training
Vulnerability Prediction

Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples

Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah | Published: 2020-02-22 | Updated: 2020-02-27
Performance Evaluation
Adversarial Example
Adversarial Training

Adversarial Attacks on Machine Learning Systems for High-Frequency Trading

Authors: Micah Goldblum, Avi Schwarzschild, Ankit B. Patel, Tom Goldstein | Published: 2020-02-21 | Updated: 2021-10-29
Transaction Generation Method
Adversarial Example
Vulnerability Prediction

A Bayes-Optimal View on Adversarial Examples

Authors: Eitan Richardson, Yair Weiss | Published: 2020-02-20 | Updated: 2021-03-17
Robustness Evaluation
Adversarial Example
Adversarial Training

On the Decision Boundaries of Neural Networks: A Tropical Geometry Perspective

Authors: Motasem Alfarra, Adel Bibi, Hasan Hammoud, Mohamed Gaafar, Bernard Ghanem | Published: 2020-02-20 | Updated: 2022-08-22
Robustness Evaluation
Adversarial Example
Optimization Problem

Towards Certifiable Adversarial Sample Detection

Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2020-02-20
Adversarial Example
Regularization
Defense Method

On Adaptive Attacks to Adversarial Example Defenses

Authors: Florian Tramer, Nicholas Carlini, Wieland Brendel, Aleksander Madry | Published: 2020-02-19 | Updated: 2020-10-23
Robustness Evaluation
Adversarial Example
Defense Method

Indirect Adversarial Attacks via Poisoning Neighbors for Graph Convolutional Networks

Authors: Tsubasa Takahashi | Published: 2020-02-19
Graph Neural Network
Adversarial Example
Adversarial Attack Detection

On the Matrix-Free Generation of Adversarial Perturbations for Black-Box Attacks

Authors: Hisaichi Shibata, Shouhei Hanaoka, Yukihiro Nomura, Naoto Hayashi, Osamu Abe | Published: 2020-02-18
Adversarial Example
Adversarial Attack Detection
Computational Efficiency