Adversarial Attack Methods

A principled approach for generating adversarial images under non-smooth dissimilarity metrics

Authors: Aram-Alexandre Pooladian, Chris Finlay, Tim Hoheisel, Adam Oberman | Published: 2019-08-05 | Updated: 2019-10-08
Robustness Improvement Method
Attack Evaluation
Adversarial Attack Methods

A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding Models

Authors: Heng Chang, Yu Rong, Tingyang Xu, Wenbing Huang, Honglei Zhang, Peng Cui, Wenwu Zhu, Junzhou Huang | Published: 2019-08-04 | Updated: 2019-12-17
Graph Filtering
Prompt Injection
Adversarial Attack Methods

Robustness properties of Facebook’s ResNeXt WSL models

Authors: A. Emin Orhan | Published: 2019-07-17 | Updated: 2019-12-09
Adversarial Attack Methods
Deep Learning Technology
Watermarking Technology

Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics

Authors: Yuxin Ma, Tiankai Xie, Jundong Li, Ross Maciejewski | Published: 2019-07-17 | Updated: 2019-10-03
Backdoor Attack
Poisoning
Adversarial Attack Methods

Adversarial Security Attacks and Perturbations on Machine Learning and Deep Learning Methods

Authors: Arif Siddiqi | Published: 2019-07-17
Poisoning
Adversarial Example
Adversarial Attack Methods

Latent Adversarial Defence with Boundary-guided Generation

Authors: Xiaowei Zhou, Ivor W. Tsang, Jie Yin | Published: 2019-07-16
Adversarial Example
Adversarial Attack Methods
Deep Learning Technology

Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving

Authors: Yulong Cao, Chaowei Xiao, Benjamin Cyr, Yimeng Zhou, Won Park, Sara Rampazzi, Qi Alfred Chen, Kevin Fu, Z. Morley Mao | Published: 2019-07-16 | Updated: 2019-08-20
Spoofing Attack Analysis
Adversarial Attack Methods
Optimization Methods

Bypassing Backdoor Detection Algorithms in Deep Learning

Authors: Te Juin Lester Tan, Reza Shokri | Published: 2019-05-31 | Updated: 2020-06-06
Pruning Method
Membership Inference
Adversarial Attack Methods

Identifying Classes Susceptible to Adversarial Attacks

Authors: Rangeet Pan, Md Johirul Islam, Shibbir Ahmed, Hridesh Rajan | Published: 2019-05-30
Vulnerability of Adversarial Examples
Adversarial Attack Methods
Deep Learning

Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and The Way Forward

Authors: Adnan Qayyum, Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-05-29
Backdoor Attack
Adversarial Example
Adversarial Attack Methods