Adversarial Learning

Towards Verifying Robustness of Neural Networks Against Semantic Perturbations

Authors: Jeet Mohapatra, Tsui-Wei, Weng, Pin-Yu Chen, Sijia Liu, Luca Daniel | Published: 2019-12-19 | Updated: 2020-06-15
Robustness Evaluation
Adversarial Learning
Deep Learning

SIGMA : Strengthening IDS with GAN and Metaheuristics Attacks

Authors: Simon Msika, Alejandro Quintero, Foutse Khomh | Published: 2019-12-18
Hybrid Algorithm
Adversarial Learning
Automated Intrusion Detection System

Fooling LIME and SHAP: Adversarial Attacks on Post hoc Explanation Methods

Authors: Dylan Slack, Sophie Hilgard, Emily Jia, Sameer Singh, Himabindu Lakkaraju | Published: 2019-11-06 | Updated: 2020-02-03
XAI (Explainable AI)
Adversarial Learning
Attacks on Explainability

Adversarial Example Detection by Classification for Deep Speech Recognition

Authors: Saeid Samizade, Zheng-Hua Tan, Chao Shen, Xiaohong Guan | Published: 2019-10-22
Adversarial Learning
Adversarial Transferability
Malfunction of Voice Assistants

White-Box Adversarial Defense via Self-Supervised Data Estimation

Authors: Zudi Lin, Hanspeter Pfister, Ziming Zhang | Published: 2019-09-13
Security Analysis
Performance Evaluation
Adversarial Learning

Defending Against Adversarial Attacks by Suppressing the Largest Eigenvalue of Fisher Information Matrix

Authors: Chaomin Shen, Yaxin Peng, Guixu Zhang, Jinsong Fan | Published: 2019-09-13
Performance Evaluation
Adversarial Example
Adversarial Learning

Black-box Adversarial ML Attack on Modulation Classification

Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-08-01
Information Security
Adversarial Learning
Deep Learning Method

Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT

Authors: Alireza Nooraiepour, Waheed U. Bajwa, Narayan B. Mandayam | Published: 2019-08-01 | Updated: 2020-07-04
Adversarial Learning
Physical layer security
Communication Model

Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding

Authors: Utku Ozbulak, Arnout Van Messem, Wesley De Neve | Published: 2019-07-30
Taxonomy of Attacks
Adversarial Example
Adversarial Learning

Adversarial Robustness Assessment: Why both $L_0$ and $L_\infty$ Attacks Are Necessary

Authors: Shashank Kotyan, Danilo Vasconcellos Vargas | Published: 2019-06-14 | Updated: 2020-07-16
Adversarial Example
Adversarial Learning
Defense Method