Adversarial Example

Deep Neural Network Ensembles against Deception: Ensemble Diversity, Accuracy and Robustness

Authors: Ling Liu, Wenqi Wei, Ka-Ho Chow, Margaret Loper, Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2019-08-29
Robustness Verification Method
Adversarial Example
Machine Learning Application

Adversarial Edit Attacks for Tree Data

Authors: Benjamin Paaßen | Published: 2019-08-25 | Updated: 2019-08-27
Adversarial Example
Adversarial Attack Detection
Machine Learning Application

Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks

Authors: Ka-Ho Chow, Wenqi Wei, Yanzhao Wu, Ling Liu | Published: 2019-08-21 | Updated: 2019-10-26
Robustness Improvement Method
Adversarial Example
Adversarial Attack Methods

Verification of Neural Network Control Policy Under Persistent Adversarial Perturbation

Authors: Yuh-Shyang Wang, Tsui-Wei Weng, Luca Daniel | Published: 2019-08-18
Robustness Improvement Method
Adversarial Example
Deep Reinforcement Learning

On the Adversarial Robustness of Neural Networks without Weight Transport

Authors: Mohamed Akrout | Published: 2019-08-09 | Updated: 2019-10-03
Robustness Improvement Method
Adversarial Example
Adversarial Attack Methods

Defending Against Adversarial Iris Examples Using Wavelet Decomposition

Authors: Sobhan Soleymani, Ali Dabouei, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2019-08-08
Robustness Improvement Method
Adversarial Example
Adversarial Attack Methods

Universal Adversarial Audio Perturbations

Authors: Sajjad Abdoli, Luiz G. Hafemann, Jerome Rony, Ismail Ben Ayed, Patrick Cardinal, Alessandro L. Koerich | Published: 2019-08-08 | Updated: 2020-11-17
Adversarial Example
Adversarial Attack Methods
Speech Signal Processing

Investigating Decision Boundaries of Trained Neural Networks

Authors: Roozbeh Yousefzadeh, Dianne P O'Leary | Published: 2019-08-07
Robustness Improvement Method
Adversarial Example
Adversarial Attack Methods

Impact of Adversarial Examples on Deep Learning Models for Biomedical Image Segmentation

Authors: Utku Ozbulak, Arnout Van Messem, Wesley De Neve | Published: 2019-07-30
Medical Image Analysis
Adversarial Example
Adversarial Training

Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding

Authors: Utku Ozbulak, Arnout Van Messem, Wesley De Neve | Published: 2019-07-30
Taxonomy of Attacks
Adversarial Example
Adversarial Learning