Adversarial Attack Methods

Adversarial Perturbations Fool Deepfake Detectors

Authors: Apurva Gandhi, Shomik Jain | Published: 2020-03-24 | Updated: 2020-05-15
Adversarial Example
Adversarial Attack Methods
Defense Method

Adversarial Transferability in Wearable Sensor Systems

Authors: Ramesh Kumar Sah, Hassan Ghasemzadeh | Published: 2020-03-17 | Updated: 2021-07-15
Adversarial Example
Adversarial Attack Methods
Non-Identical Dataset

Diversity can be Transferred: Output Diversification for White- and Black-box Attacks

Authors: Yusuke Tashiro, Yang Song, Stefano Ermon | Published: 2020-03-15 | Updated: 2020-10-30
Poisoning
Adversarial Attack Methods
Vulnerability Attack Method

A Survey of Adversarial Learning on Graphs

Authors: Liang Chen, Jintang Li, Jiaying Peng, Tao Xie, Zengxu Cao, Kun Xu, Xiangnan He, Zibin Zheng, Bingzhe Wu | Published: 2020-03-10 | Updated: 2022-04-05
Poisoning
Adversarial Attack Methods
Defense Method

Security of Distributed Machine Learning: A Game-Theoretic Approach to Design Secure DSVM

Authors: Rui Zhang, Quanyan Zhu | Published: 2020-03-08 | Updated: 2020-04-26
Game Theory
Poisoning
Adversarial Attack Methods

Identifying Audio Adversarial Examples via Anomalous Pattern Detection

Authors: Victor Akinwande, Celia Cintas, Skyler Speakman, Srihari Sridharan | Published: 2020-02-13 | Updated: 2020-07-25
Vulnerability of Adversarial Examples
Adversarial Attack Methods
Machine Learning Application

Over-the-Air Adversarial Flickering Attacks against Video Recognition Networks

Authors: Roi Pony, Itay Naeh, Shie Mannor | Published: 2020-02-12 | Updated: 2021-06-04
Video Classification
Expression of Gratitude
Adversarial Attack Methods

Attack based DoS attack detection using multiple classifier

Authors: Mohamed Abushwereb, Muhannad Mustafa, Mouhammd Al-kasassbeh, Malik Qasaimeh | Published: 2020-01-16
DDoS Attack Detection
Network Threat Detection
Adversarial Attack Methods

Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning

Authors: Roei Schuster, Tal Schuster, Yoav Meri, Vitaly Shmatikov | Published: 2020-01-14
Membership Inference
Adversarial Attack Methods
Statistical Analysis

Advbox: a toolbox to generate adversarial examples that fool neural networks

Authors: Dou Goodman, Hao Xin, Wang Yang, Wu Yuesheng, Xiong Junfeng, Zhang Huan | Published: 2020-01-13 | Updated: 2020-08-26
Poisoning
Adversarial Example
Adversarial Attack Methods