Adversarial Example

Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls

Authors: Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, Jason H. Li | Published: 2018-11-05
Online Learning
Membership Inference
Adversarial Example

Excessive Invariance Causes Adversarial Vulnerability

Authors: Jörn-Henrik Jacobsen, Jens Behrmann, Richard Zemel, Matthias Bethge | Published: 2018-11-01 | Updated: 2020-07-12
Model Inversion
Adversarial Example
Adversarial Training

Robust Audio Adversarial Example for a Physical Attack

Authors: Hiromu Yakura, Jun Sakuma | Published: 2018-10-28 | Updated: 2019-08-19
Backdoor Attack
Signal Processing Techniques
Adversarial Example

Exploring Adversarial Examples in Malware Detection

Authors: Octavian Suciu, Scott E. Coull, Jeffrey Johns | Published: 2018-10-18 | Updated: 2019-04-13
Poisoning
Adversarial Example
Adversarial Attack Methods

Adversarial Examples – A Complete Characterisation of the Phenomenon

Authors: Alexandru Constantin Serban, Erik Poll, Joost Visser | Published: 2018-10-02 | Updated: 2019-02-17
Robustness Improvement Method
Adversarial Example
Adversarial Attack Methods

Adversarial Attacks and Defences: A Survey

Authors: Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, Debdeep Mukhopadhyay | Published: 2018-09-28
Model Inversion
Adversarial Example
Adversarial Attack Methods

Adversarial Recommendation: Attack of the Learned Fake Users

Authors: Konstantina Christakopoulou, Arindam Banerjee | Published: 2018-09-21
Adversarial Example
Adversarial Attack Methods
Generative Model

HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples

Authors: Deqiang Li, Ramesh Baral, Tao Li, Han Wang, Qianmu Li, Shouhuai Xu | Published: 2018-09-18
Robustness Improvement Method
Adversarial Example
Adversarial Attack Methods

Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks

Authors: Siyue Wang, Xiao Wang, Pu Zhao, Wujie Wen, David Kaeli, Peter Chin, Xue Lin | Published: 2018-09-13
Certified Robustness
Robustness Improvement
Adversarial Example

Adversarial Examples: Opportunities and Challenges

Authors: Jiliang Zhang, Chen Li | Published: 2018-09-13 | Updated: 2019-09-23
Certified Robustness
Adversarial Example
Defense Method