Adversarial Example

Attacking Bayes: On the Adversarial Robustness of Bayesian Neural Networks

Authors: Yunzhen Feng, Tim G. J. Rudner, Nikolaos Tsilivis, Julia Kempe | Published: 2024-04-27
Quantification of Uncertainty
Adversarial Example
Watermark Evaluation

Evaluations of Machine Learning Privacy Defenses are Misleading

Authors: Michael Aerni, Jie Zhang, Florian Tramèr | Published: 2024-04-26 | Updated: 2024-09-05
Privacy Protection Method
Membership Inference
Adversarial Example

Black-box Adversarial Transferability: An Empirical Study in Cybersecurity Perspective

Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2024-04-15
DDoS Attack Detection
Attack Method
Adversarial Example

Adversarial Robustness of Distilled and Pruned Deep Learning-based Wireless Classifiers

Authors: Nayan Moni Baishya, B. R. Manoj | Published: 2024-04-11
Edge Computing
Adversarial Example
Adversarial Training

BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial Attack

Authors: Viet Quoc Vo, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2024-04-08 | Updated: 2024-06-01
Watermarking
Attack Method
Adversarial Example

Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism

Authors: Trilokesh Ranjan Sarkar, Nilanjan Das, Pralay Sankar Maitra, Bijoy Some, Ritwik Saha, Orijita Adhikary, Bishal Bose, Jaydip Sen | Published: 2024-04-05
Watermarking
Model Performance Evaluation
Adversarial Example

Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process

Authors: Vitaliy Pozdnyakov, Aleksandr Kovalenko, Ilya Makarov, Mikhail Drobyshevskiy, Kirill Lukyanov | Published: 2024-03-20 | Updated: 2024-06-07
Attack Method
Adversarial Example
Defense Method

SSCAE — Semantic, Syntactic, and Context-aware natural language Adversarial Examples generator

Authors: Javad Rafiei Asl, Mohammad H. Rafiei, Manar Alohaly, Daniel Takabi | Published: 2024-03-18
Dynamic Threshold Calculation
Adversarial Example
Evaluation Method

Effect of Ambient-Intrinsic Dimension Gap on Adversarial Vulnerability

Authors: Rajdeep Haldar, Yue Xing, Qifan Song | Published: 2024-03-06 | Updated: 2024-03-23
Clustering methods
Adversarial Example
Adversarial Training

Robustness bounds on the successful adversarial examples in probabilistic models: Implications from Gaussian processes

Authors: Hiroaki Maeshima, Akira Otsuka | Published: 2024-03-04 | Updated: 2025-03-19
Attack Method
Adversarial Example
Watermark Evaluation