Adversarial Example

Feedback Learning for Improving the Robustness of Neural Networks

Authors: Chang Song, Zuoguan Wang, Hai Li | Published: 2019-09-12
Class Imbalance
Attack Method
Adversarial Example

Localized Adversarial Training for Increased Accuracy and Robustness in Image Classification

Authors: Eitan Rothberg, Tingting Chen, Luo Jie, Hao Ji | Published: 2019-09-10
Adversarial Example
Background Pixel Attack
Adaptive Adversarial Training

Effectiveness of Adversarial Examples and Defenses for Malware Classification

Authors: Robert Podschwadt, Hassan Takabi | Published: 2019-09-10
Attack Method
Adversarial Example
Adaptive Adversarial Training

Learning to Disentangle Robust and Vulnerable Features for Adversarial Detection

Authors: Byunggill Joe, Sung Ju Hwang, Insik Shin | Published: 2019-09-10
Adversarial Example
Adversarial Example Detection
Adversarial Training

BOSH: An Efficient Meta Algorithm for Decision-based Attacks

Authors: Zhenxin Xiao, Puyudi Yang, Yuchen Jiang, Kai-Wei Chang, Cho-Jui Hsieh | Published: 2019-09-10 | Updated: 2019-10-14
Adversarial Example
Adversarial Example Detection
Adversarial Training

When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures

Authors: Gil Fidel, Ron Bitton, Asaf Shabtai | Published: 2019-09-08
Poisoning
Adversarial Example
Adversarial Example Detection

On the Need for Topology-Aware Generative Models for Manifold-Based Defenses

Authors: Uyeong Jang, Susmit Jha, Somesh Jha | Published: 2019-09-07 | Updated: 2020-02-17
Topology Analysis
Adversarial Example
Machine Learning

Achieving Verified Robustness to Symbol Substitutions via Interval Bound Propagation

Authors: Po-Sen Huang, Robert Stanforth, Johannes Welbl, Chris Dyer, Dani Yogatama, Sven Gowal, Krishnamurthy Dvijotham, Pushmeet Kohli | Published: 2019-09-03 | Updated: 2019-12-20
Improvement of Learning
Adversarial Example
Vulnerability of Adversarial Examples

High Accuracy and High Fidelity Extraction of Neural Networks

Authors: Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot | Published: 2019-09-03 | Updated: 2020-03-03
Model Extraction Attack
Model Evaluation
Adversarial Example

Universal, transferable and targeted adversarial attacks

Authors: Junde Wu, Rao Fu | Published: 2019-08-29 | Updated: 2022-06-13
Poisoning
Adversarial Example
Adversarial Attack Detection