Adversarial Example

Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain

Authors: Yigit Alparslan, Ken Alparslan, Jeremy Keim-Shenk, Shweta Khade, Rachel Greenstadt | Published: 2020-01-30 | Updated: 2021-02-08
Robustness Improvement Method
Adversarial Example
Adversarial Perturbation Techniques

Generating Natural Adversarial Hyperspectral examples with a modified Wasserstein GAN

Authors: Jean-Christophe Burnel, Kilian Fatras, Nicolas Courty | Published: 2020-01-27
Data Generation Method
Adversarial Example
Generative Adversarial Network

On the human evaluation of audio adversarial examples

Authors: Jon Vadillo, Roberto Santana | Published: 2020-01-23 | Updated: 2021-02-12
Adversarial Example
Adversarial Attack Detection
Malfunction of Voice Assistants

HRFA: High-Resolution Feature-based Attack

Authors: Zhixing Ye, Sizhe Chen, Peidong Zhang, Chengjin Sun, Xiaolin Huang | Published: 2020-01-21 | Updated: 2020-10-22
Adversarial Example
Adversarial Attack Detection
Generative Adversarial Network

Secure and Robust Machine Learning for Healthcare: A Survey

Authors: Adnan Qayyum, Junaid Qadir, Muhammad Bilal, Ala Al-Fuqaha | Published: 2020-01-21
Medical Image Analysis
Adversarial Example
Machine Learning Method

Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks

Authors: Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan | Published: 2020-01-16
Adversarial Example
Adversarial Learning
Computational Complexity

Advbox: a toolbox to generate adversarial examples that fool neural networks

Authors: Dou Goodman, Hao Xin, Wang Yang, Wu Yuesheng, Xiong Junfeng, Zhang Huan | Published: 2020-01-13 | Updated: 2020-08-26
Poisoning
Adversarial Example
Adversarial Attack Methods

Fast is better than free: Revisiting adversarial training

Authors: Eric Wong, Leslie Rice, J. Zico Kolter | Published: 2020-01-12
Adversarial Example
Adversarial attack
Deep Learning Method

Generating Semantic Adversarial Examples via Feature Manipulation

Authors: Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen | Published: 2020-01-06 | Updated: 2022-05-20
Data Generation
Adversarial Example
Adversarial Learning

Benchmarking Adversarial Robustness

Authors: Yinpeng Dong, Qi-An Fu, Xiao Yang, Tianyu Pang, Hang Su, Zihao Xiao, Jun Zhu | Published: 2019-12-26
Poisoning
Adversarial Example
Effectiveness Analysis of Defense Methods