Adversarial Learning

Adversarial Attacks and Defenses on Graphs: A Review, A Tool and Empirical Studies

Authors: Wei Jin, Yaxin Li, Han Xu, Yiqi Wang, Shuiwang Ji, Charu Aggarwal, Jiliang Tang | Published: 2020-03-02 | Updated: 2020-12-12
Poisoning
Adversarial Example
Adversarial Learning

Adversarial Perturbations Prevail in the Y-Channel of the YCbCr Color Space

Authors: Camilo Pestana, Naveed Akhtar, Wei Liu, David Glance, Ajmal Mian | Published: 2020-02-25
Robustness Evaluation
Adversarial Learning
Defense Method

Practical Fast Gradient Sign Attack against Mammographic Image Classifier

Authors: Ibrahim Yilmaz | Published: 2020-01-27
Adversarial Learning
Adversarial Attack Detection
Machine Learning Method

Ensemble Noise Simulation to Handle Uncertainty about Gradient-based Adversarial Attacks

Authors: Rehana Mahfuz, Rajeev Sahay, Aly El Gamal | Published: 2020-01-26
Adversarial Learning
Adversarial Attack Detection
Effectiveness Analysis of Defense Methods

Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks

Authors: Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan | Published: 2020-01-16
Adversarial Example
Adversarial Learning
Computational Complexity

A simple way to make neural networks robust against diverse image corruptions

Authors: Evgenia Rusak, Lukas Schott, Roland S. Zimmermann, Julian Bitterwolf, Oliver Bringmann, Matthias Bethge, Wieland Brendel | Published: 2020-01-16 | Updated: 2020-07-22
Robustness Analysis
Convergence analysis
Adversarial Learning

Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet

Authors: Sizhe Chen, Zhengbao He, Chengjin Sun, Jie Yang, Xiaolin Huang | Published: 2020-01-16 | Updated: 2020-10-21
Adversarial Learning
Adversarial Attack Detection
Research Methodology

To Transfer or Not to Transfer: Misclassification Attacks Against Transfer Learned Text Classifiers

Authors: Bijeeta Pal, Shruti Tople | Published: 2020-01-08
Prompt Injection
Membership Inference
Adversarial Learning

Softmax-based Classification is k-means Clustering: Formal Proof, Consequences for Adversarial Attacks, and Improvement through Centroid Based Tailoring

Authors: Sibylle Hess, Wouter Duivesteijn, Decebal Mocanu | Published: 2020-01-07
Clustering methods
Robustness Evaluation
Adversarial Learning

WAF-A-MoLE: Evading Web Application Firewalls through Adversarial Machine Learning

Authors: Luca Demetrio, Andrea Valenza, Gabriele Costa, Giovanni Lagorio | Published: 2020-01-07
Robustness Evaluation
Malicious Client
Adversarial Learning