Adversarial Example

Failure Modes in Machine Learning Systems

Authors: Ram Shankar Siva Kumar, David O Brien, Kendra Albert, Salomé Viljöen, Jeffrey Snover | Published: 2019-11-25
Backdoor Attack
Privacy Violation
Adversarial Example

Universal adversarial examples in speech command classification

Authors: Jon Vadillo, Roberto Santana | Published: 2019-11-22 | Updated: 2021-02-13
Adversarial Example
Adversarial Attack Methods
Research Methodology

Attack Agnostic Statistical Method for Adversarial Detection

Authors: Sambuddha Saha, Aashish Kumar, Pratyush Sahay, George Jose, Srinivas Kruthiventi, Harikrishna Muralidhara | Published: 2019-11-22
Adversarial Example
Adversarial attack
Research Methodology

Deep Minimax Probability Machine

Authors: Lirong He, Ziyi Guo, Kaizhu Huang, Zenglin Xu | Published: 2019-11-20
Model Performance Evaluation
Adversarial Example
Adversarial Attack Methods

Generate (non-software) Bugs to Fool Classifiers

Authors: Hiromu Yakura, Youhei Akimoto, Jun Sakuma | Published: 2019-11-20
Model Performance Evaluation
Adversarial Example
Adversarial Attack Methods

Deep Detector Health Management under Adversarial Campaigns

Authors: Javier Echauz, Keith Kenemer, Sarfaraz Hussein, Jay Dhaliwal, Saurabh Shintre, Slawomir Grzonkowski, Andrew Gardner | Published: 2019-11-19
Class Imbalance
Adversarial Example
Adversarial Attack Methods

Attack on Grid Event Cause Analysis: An Adversarial Machine Learning Approach

Authors: Iman Niazazari, Hanif Livani | Published: 2019-11-19 | Updated: 2019-11-25
Adversarial Example
Adversarial Attack Methods
Effectiveness Analysis of Defense Methods

Black-Box Adversarial Attack with Transferable Model-based Embedding

Authors: Zhichao Huang, Tong Zhang | Published: 2019-11-17 | Updated: 2020-01-05
Adversarial Example
Adversarial Attack Methods
Knowledge Transferability

Defending Against Model Stealing Attacks with Adaptive Misinformation

Authors: Sanjay Kariyappa, Moinuddin K Qureshi | Published: 2019-11-16
Adversarial Example
Adversarial Attack Methods
Effectiveness Analysis of Defense Methods

There is Limited Correlation between Coverage and Robustness for Deep Neural Networks

Authors: Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Dai Ting | Published: 2019-11-14
Model Performance Evaluation
Adversarial Example
Adversarial Attack Methods