Adversarial Attack Methods

Playing it Safe: Adversarial Robustness with an Abstain Option

Authors: Cassidy Laidlaw, Soheil Feizi | Published: 2019-11-25
Adversarial Learning
Adversarial Example
Adversarial Attack Methods

One Man’s Trash is Another Man’s Treasure: Resisting Adversarial Examples by Adversarial Examples

Authors: Chang Xiao, Changxi Zheng | Published: 2019-11-25 | Updated: 2019-11-27
Adversarial Example
Adversarial Attack Methods
Effectiveness Analysis of Defense Methods

Adversarial Attack with Pattern Replacement

Authors: Ziang Dong, Liang Mao, Shiliang Sun | Published: 2019-11-25
Model Design
Adversarial Attack Methods
Research Methodology

Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Networks for Secure Inference

Authors: Wei-An Lin, Yogesh Balaji, Pouya Samangouei, Rama Chellappa | Published: 2019-11-23
Model Design
Adversarial Attack Methods
Research Methodology

Universal adversarial examples in speech command classification

Authors: Jon Vadillo, Roberto Santana | Published: 2019-11-22 | Updated: 2021-02-13
Adversarial Example
Adversarial Attack Methods
Research Methodology

Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation

Authors: Alexander Levine, Soheil Feizi | Published: 2019-11-21
Model Performance Evaluation
Numerical Stability Issues
Adversarial Attack Methods

Fine-grained Synthesis of Unrestricted Adversarial Examples

Authors: Omid Poursaeed, Tianxing Jiang, Yordanos Goshu, Harry Yang, Serge Belongie, Ser-Nam Lim | Published: 2019-11-20 | Updated: 2020-10-22
Model Performance Evaluation
Model Design
Adversarial Attack Methods

Deep Minimax Probability Machine

Authors: Lirong He, Ziyi Guo, Kaizhu Huang, Zenglin Xu | Published: 2019-11-20
Model Performance Evaluation
Adversarial Example
Adversarial Attack Methods

Adversarial Robustness of Flow-Based Generative Models

Authors: Phillip Pope, Yogesh Balaji, Soheil Feizi | Published: 2019-11-20
Trade-off Analysis
Model Design
Adversarial Attack Methods

Generate (non-software) Bugs to Fool Classifiers

Authors: Hiromu Yakura, Youhei Akimoto, Jun Sakuma | Published: 2019-11-20
Model Performance Evaluation
Adversarial Example
Adversarial Attack Methods