Adversarial Learning

A simple way to make neural networks robust against diverse image corruptions

Authors: Evgenia Rusak, Lukas Schott, Roland S. Zimmermann, Julian Bitterwolf, Oliver Bringmann, Matthias Bethge, Wieland Brendel | Published: 2020-01-16 | Updated: 2020-07-22
Robustness Analysis
Convergence analysis
Adversarial Learning

Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet

Authors: Sizhe Chen, Zhengbao He, Chengjin Sun, Jie Yang, Xiaolin Huang | Published: 2020-01-16 | Updated: 2020-10-21
Adversarial Learning
Adversarial Attack Detection
Research Methodology

To Transfer or Not to Transfer: Misclassification Attacks Against Transfer Learned Text Classifiers

Authors: Bijeeta Pal, Shruti Tople | Published: 2020-01-08
Prompt Injection
Membership Inference
Adversarial Learning

Softmax-based Classification is k-means Clustering: Formal Proof, Consequences for Adversarial Attacks, and Improvement through Centroid Based Tailoring

Authors: Sibylle Hess, Wouter Duivesteijn, Decebal Mocanu | Published: 2020-01-07
Clustering methods
Robustness Evaluation
Adversarial Learning

WAF-A-MoLE: Evading Web Application Firewalls through Adversarial Machine Learning

Authors: Luca Demetrio, Andrea Valenza, Gabriele Costa, Giovanni Lagorio | Published: 2020-01-07
Robustness Evaluation
Malicious Client
Adversarial Learning

Generating Semantic Adversarial Examples via Feature Manipulation

Authors: Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen | Published: 2020-01-06 | Updated: 2022-05-20
Data Generation
Adversarial Example
Adversarial Learning

Toward Optimal Adversarial Policies in the Multiplicative Learning System with a Malicious Expert

Authors: S. Rasoul Etesami, Negar Kiyavash, Vincent Leon, H. Vincent Poor | Published: 2020-01-02 | Updated: 2020-09-18
Adversarial Learning
Optimization Methods
Statistical Methods

ATHENA: A Framework based on Diverse Weak Defenses for Building Adversarial Defense

Authors: Ying Meng, Jianhai Su, Jason O'Kane, Pooyan Jamshidi | Published: 2020-01-02 | Updated: 2020-10-16
Adversarial Learning
Watermark Evaluation
Effectiveness Analysis of Defense Methods

Face X-ray for More General Face Forgery Detection

Authors: Lingzhi Li, Jianmin Bao, Ting Zhang, Hao Yang, Dong Chen, Fang Wen, Baining Guo | Published: 2019-12-31 | Updated: 2020-04-19
Algorithm
Detection of Deepfakes
Adversarial Learning

Adversarial Example Generation using Evolutionary Multi-objective Optimization

Authors: Takahiro Suzuki, Shingo Takeshita, Satoshi Ono | Published: 2019-12-30
Effective Perturbation Methods
Multi-Objective Optimization
Adversarial Learning