Adversarial Example

Mitigation of Policy Manipulation Attacks on Deep Q-Networks with Parameter-Space Noise

Authors: Vahid Behzadan, Arslan Munir | Published: 2018-06-04
Certified Robustness
Reinforcement Learning
Adversarial Example

Sufficient Conditions for Idealised Models to Have No Adversarial Examples: a Theoretical and Empirical Study with Bayesian Neural Networks

Authors: Yarin Gal, Lewis Smith | Published: 2018-06-02 | Updated: 2018-06-28
Label Uncertainty
Adversarial Example
Adversarial Transferability

Resisting Adversarial Attacks using Gaussian Mixture Variational Autoencoders

Authors: Partha Ghosh, Arpan Losalka, Michael J Black | Published: 2018-05-31 | Updated: 2018-12-10
Certified Robustness
Loss Function
Adversarial Example

Knowledge Distillation with Adversarial Samples Supporting Decision Boundary

Authors: Byeongho Heo, Minsik Lee, Sangdoo Yun, Jin Young Choi | Published: 2018-05-15 | Updated: 2018-12-14
Adversarial Example
Adversarial Attack Detection
Knowledge Distillation

Detecting Adversarial Samples for Deep Neural Networks through Mutation Testing

Authors: Jingyi Wang, Jun Sun, Peixin Zhang, Xinyu Wang | Published: 2018-05-14 | Updated: 2018-05-17
Certified Robustness
Adversarial Example
Adversarial Attack Detection

Black-box Adversarial Attacks with Limited Queries and Information

Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin | Published: 2018-04-23 | Updated: 2018-07-11
Model Extraction Attack
Adversarial Example
Adversarial Attack Methods

An ADMM-Based Universal Framework for Adversarial Attacks on Deep Neural Networks

Authors: Pu Zhao, Sijia Liu, Yanzhi Wang, Xue Lin | Published: 2018-04-09
Backdoor Detection
Adversarial Example
Adversarial attack

Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks

Authors: Octavian Suciu, Radu Mărginean, Yiğitcan Kaya, Hal Daumé III, Tudor Dumitraş | Published: 2018-03-19 | Updated: 2019-03-08
Performance Evaluation Metrics
Adversarial Example
Adversarial Learning

Vulnerability of Deep Learning

Authors: Richard Kenway | Published: 2018-03-16
Convergence Property
Adversarial Example
Adversarial Learning

Detecting Adversarial Examples – A Lesson from Multimedia Forensics

Authors: Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme | Published: 2018-03-09
Adversarial Example
Adversarial Example Detection
Adversarial Attack Methods