Adversarial Example

The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation Detection

Authors: Muhammad Zaid Hameed, Andras Gyorgy, Deniz Gunduz | Published: 2019-02-27 | Updated: 2020-04-07
Adversarial Example
Adversarial Learning
Wireless Channel Detection

Adversarial Attacks on Graph Neural Networks via Meta Learning

Authors: Daniel Zügner, Stephan Günnemann | Published: 2019-02-22 | Updated: 2024-01-28
Graph Construction
Adversarial Example
Adversarial Attack Methods

Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces

Authors: Mohammad Saidur Rahman, Mohsen Imani, Nate Mathews, Matthew Wright | Published: 2019-02-18 | Updated: 2020-10-28
Backdoor Detection
Adversarial Example
Adversarial Attack Methods

Adversarial Examples in RF Deep Learning: Detection of the Attack and its Physical Robustness

Authors: Silvija Kokalj-Filipovic, Rob Miller | Published: 2019-02-16
Adversarial Example
Adversarial attack
Adversarial Attack Methods

Can Intelligent Hyperparameter Selection Improve Resistance to Adversarial Examples?

Authors: Cody Burkard, Brent Lagesse | Published: 2019-02-14
Adversarial Example
Adversarial Example Detection
Adversarial Attack Methods

Is Spiking Secure? A Comparative Study on the Security Vulnerabilities of Spiking and Deep Neural Networks

Authors: Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique | Published: 2019-02-04 | Updated: 2020-05-18
Adversarial Example
Adversarial Learning
Adversarial attack

Robustness Certificates Against Adversarial Examples for ReLU Networks

Authors: Sahil Singla, Soheil Feizi | Published: 2019-02-01 | Updated: 2019-02-05
Robustness Improvement
Adversarial Example
Adversarial attack

A New Family of Neural Networks Provably Resistant to Adversarial Attacks

Authors: Rakshit Agrawal, Luca de Alfaro, David Helmbold | Published: 2019-02-01
Adversarial Example
Adversarial Learning
Adversarial attack

CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks

Authors: Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique | Published: 2019-01-28 | Updated: 2019-05-24
Adversarial Example
Adversarial Perturbation Techniques
Adversarial attack

Interpretable Complex-Valued Neural Networks for Privacy Protection

Authors: Liyao Xiang, Haotian Ma, Hao Zhang, Yifan Zhang, Jie Ren, Quanshi Zhang | Published: 2019-01-28 | Updated: 2020-01-14
Differential Privacy
Adversarial Example
Deep Learning Method