Adversarial Attack Methods

There is Limited Correlation between Coverage and Robustness for Deep Neural Networks

Authors: Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Dai Ting | Published: 2019-11-14
Model Performance Evaluation
Adversarial Example
Adversarial Attack Methods

Adversarial Examples in Modern Machine Learning: A Review

Authors: Rey Reza Wiyatno, Anqi Xu, Ousmane Dia, Archy de Berker | Published: 2019-11-13 | Updated: 2019-11-15
Poisoning
Adversarial Example
Adversarial Attack Methods

On Robustness to Adversarial Examples and Polynomial Optimization

Authors: Pranjal Awasthi, Abhratanu Dutta, Aravindan Vijayaraghavan | Published: 2019-11-12
Model Performance Evaluation
Adversarial Attack Methods
Computational Problem

Patch augmentation: Towards efficient decision boundaries for neural networks

Authors: Marcus D. Bloice, Peter M. Roth, Andreas Holzinger | Published: 2019-11-08 | Updated: 2019-11-25
Model Performance Evaluation
Adversarial Attack Methods
Feature Engineering

White-Box Target Attack for EEG-Based BCI Regression Problems

Authors: Lubin Meng, Chin-Teng Lin, Tzyy-Ring Jung, Dongrui Wu | Published: 2019-11-07
Model Performance Evaluation
Adversarial Attack Methods
Knowledge Transferability

Confidence-Calibrated Adversarial Training: Generalizing to Unseen Attacks

Authors: David Stutz, Matthias Hein, Bernt Schiele | Published: 2019-10-14 | Updated: 2020-06-30
Poisoning
Attack Evaluation
Adversarial Attack Methods

Hear “No Evil”, See “Kenansville”: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems

Authors: Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor | Published: 2019-10-11
Attack Evaluation
Adversarial Attack Methods
Speech Recognition Technology

Adversarial Training: embedding adversarial perturbations into the parameter space of a neural network to build a robust system

Authors: Shixian Wen, Laurent Itti | Published: 2019-10-09
Adversarial Example
Adversarial Attack Methods
Adaptive Adversarial Training

Deep Latent Defence

Authors: Giulio Zizzo, Chris Hankin, Sergio Maffeis, Kevin Jones | Published: 2019-10-09 | Updated: 2020-09-27
Adversarial Example
Adversarial Attack Methods
Adaptive Adversarial Training

Adversarial Learning of Deepfakes in Accounting

Authors: Marco Schreyer, Timur Sattarov, Bernd Reimer, Damian Borth | Published: 2019-10-09
Data Integrity Constraints
Adversarial Attack Methods
Generative Adversarial Network