Adversarial Attack Methods

SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations

Authors: Ali Dabouei, Sobhan Soleymani, Fariborz Taherkhani, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2019-10-08
Attack Evaluation
Adversarial Example
Adversarial Attack Methods

Adversarial Examples for Cost-Sensitive Classifiers

Authors: Gavin S. Hartnett, Andrew J. Lohn, Alexander P. Sedlack | Published: 2019-10-04
Poisoning
Attack Evaluation
Adversarial Attack Methods

BUZz: BUffer Zones for defending adversarial examples in image classification

Authors: Kaleel Mahmood, Phuong Ha Nguyen, Lam M. Nguyen, Thanh Nguyen, Marten van Dijk | Published: 2019-10-03 | Updated: 2020-06-16
Poisoning
Attack Evaluation
Adversarial Attack Methods

Perturbations are not Enough: Generating Adversarial Examples with Spatial Distortions

Authors: He Zhao, Trung Le, Paul Montague, Olivier De Vel, Tamas Abraham, Dinh Phung | Published: 2019-10-03
Adversarial Example
Adversarial Attack Methods
Generative Adversarial Network

Attacking Vision-based Perception in End-to-End Autonomous Driving Models

Authors: Adith Boloor, Karthik Garimella, Xin He, Christopher Gill, Yevgeniy Vorobeychik, Xuan Zhang | Published: 2019-10-02
Attack Evaluation
Adversarial Attack Methods
Vehicle Hijacking Attack

Analyzing and Improving Neural Networks by Generating Semantic Counterexamples through Differentiable Rendering

Authors: Lakshya Jain, Varun Chandrasekaran, Uyeong Jang, Wilson Wu, Andrew Lee, Andy Yan, Steven Chen, Somesh Jha, Sanjit A. Seshia | Published: 2019-10-02 | Updated: 2020-07-17
Semantic Information Extraction
Attack Evaluation
Adversarial Attack Methods

An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack

Authors: Yang Zhang, Shiyu Chang, Mo Yu, Kaizhi Qian | Published: 2019-10-01
Backdoor Attack
Model Design and Accuracy
Adversarial Attack Methods

Black-box Adversarial Attacks with Bayesian Optimization

Authors: Satya Narayan Shukla, Anit Kumar Sahu, Devin Willmott, J. Zico Kolter | Published: 2019-09-30
Bayesian Optimization
Model Design and Accuracy
Adversarial Attack Methods

Testing Robustness Against Unforeseen Adversaries

Authors: Max Kaufmann, Daniel Kang, Yi Sun, Steven Basart, Xuwang Yin, Mantas Mazeika, Akul Arora, Adam Dziedzic, Franziska Boenisch, Tom Brown, Jacob Steinhardt, Dan Hendrycks | Published: 2019-08-21 | Updated: 2023-10-30
Robustness Improvement Method
Future Research
Adversarial Attack Methods

Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks

Authors: Ka-Ho Chow, Wenqi Wei, Yanzhao Wu, Ling Liu | Published: 2019-08-21 | Updated: 2019-10-26
Robustness Improvement Method
Adversarial Example
Adversarial Attack Methods