Adversarial Example

Are adversarial examples inevitable?

Authors: Ali Shafahi, W. Ronny Huang, Christoph Studer, Soheil Feizi, Tom Goldstein | Published: 2018-09-06 | Updated: 2020-02-03
Robustness Analysis
Adversarial Example
Adversarial Example Detection

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection

Authors: Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren | Published: 2018-08-10 | Updated: 2021-11-16
Differential Privacy
Adversarial Example
Adversarial attack

DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes

Authors: Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar | Published: 2018-08-03 | Updated: 2020-04-23
Certified Robustness
Adversarial Example
Adversarial attack

Limitations of the Lipschitz constant as a defense against adversarial examples

Authors: Todd Huster, Cho-Yu Jason Chiang, Ritu Chadha | Published: 2018-07-25
Model Evaluation
Robustness Evaluation
Adversarial Example

Motivating the Rules of the Game for Adversarial Example Research

Authors: Justin Gilmer, Ryan P. Adams, Ian Goodfellow, David Andersen, George E. Dahl | Published: 2018-07-18 | Updated: 2018-07-20
Certified Robustness
Adversarial Example
Adversarial attack

Adversarial Perturbations Against Real-Time Video Classification Systems

Authors: Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy Chowdhury, Ananthram Swami | Published: 2018-07-02
Dual-Purpose Universal Perturbations
Effective Perturbation Methods
Adversarial Example

Adversarial Reprogramming of Neural Networks

Authors: Gamaleldin F. Elsayed, Ian Goodfellow, Jascha Sohl-Dickstein | Published: 2018-06-28 | Updated: 2018-11-29
Certified Robustness
Adversarial Example
Watermark

Adversarial Distillation of Bayesian Neural Network Posteriors

Authors: Kuan-Chieh Wang, Paul Vicol, James Lucas, Li Gu, Roger Grosse, Richard Zemel | Published: 2018-06-27
Certified Robustness
Adversarial Example
Deep Learning Technology

Hardware Trojan Attacks on Neural Networks

Authors: Joseph Clements, Yingjie Lao | Published: 2018-06-14
Trigger Detection
Adversarial Example
Deep Learning Technology

Defense Against the Dark Arts: An overview of adversarial example security research and future research directions

Authors: Ian Goodfellow | Published: 2018-06-11
Certified Robustness
Adversarial Example
Adversarial Training