Adversarial Example

Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes

Authors: Keane Lucas, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, Saurabh Shintre | Published: 2019-12-19 | Updated: 2021-10-25
Binary Diversification
Adversarial Example
Deep Learning Technology

Stealing Knowledge from Protected Deep Neural Networks Using Composite Unlabeled Data

Authors: Itay Mosafi, Eli David, Nathan S. Netanyahu | Published: 2019-12-09
DNN IP Protection Method
Adversarial Example
Deep Learning Method

Hardening Random Forest Cyber Detectors Against Adversarial Attacks

Authors: Giovanni Apruzzese, Mauro Andreolini, Michele Colajanni, Mirco Marchetti | Published: 2019-12-09
Data Generation
Robustness
Adversarial Example

Principal Component Properties of Adversarial Samples

Authors: Malhar Jere, Sandro Herbig, Christine Lind, Farinaz Koushanfar | Published: 2019-12-07
Robustness
Adversarial Example
Adversarial Spectrum Attack Detection

Label-Consistent Backdoor Attacks

Authors: Alexander Turner, Dimitris Tsipras, Aleksander Madry | Published: 2019-12-05 | Updated: 2019-12-06
Backdoor Attack
Poisoning
Adversarial Example

A Method for Computing Class-wise Universal Adversarial Perturbations

Authors: Tejus Gupta, Abhishek Sinha, Nupur Kumari, Mayank Singh, Balaji Krishnamurthy | Published: 2019-12-01
Adversarial Example
Vulnerability of Adversarial Examples
Deep Learning

Computer Systems Have 99 Problems, Let’s Not Make Machine Learning Another One

Authors: David Mohaisen, Songqing Chen | Published: 2019-11-28
Model Evaluation
Adversarial Example
Machine Learning Algorithm

An Adaptive View of Adversarial Robustness from Test-time Smoothing Defense

Authors: Chao Tang, Yifei Fan, Anthony Yezzi | Published: 2019-11-26
Poisoning
Adversarial Example
Research Methodology

Playing it Safe: Adversarial Robustness with an Abstain Option

Authors: Cassidy Laidlaw, Soheil Feizi | Published: 2019-11-25
Adversarial Learning
Adversarial Example
Adversarial Attack Methods

One Man’s Trash is Another Man’s Treasure: Resisting Adversarial Examples by Adversarial Examples

Authors: Chang Xiao, Changxi Zheng | Published: 2019-11-25 | Updated: 2019-11-27
Adversarial Example
Adversarial Attack Methods
Effectiveness Analysis of Defense Methods