Adversarial Attack Methods

TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents

Authors: Panagiota Kiourti, Kacper Wardega, Susmit Jha, Wenchao Li | Published: 2019-03-01
Poisoning
Reinforcement Learning
Adversarial Attack Methods

Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment

Authors: Ziqi Yang, Ee-Chien Chang, Zhenkai Liang | Published: 2019-02-22
Model Inversion
Adversarial Attack Methods
Optimization Methods

Adversarial Attacks on Graph Neural Networks via Meta Learning

Authors: Daniel Zügner, Stephan Günnemann | Published: 2019-02-22 | Updated: 2024-01-28
Graph Construction
Adversarial Example
Adversarial Attack Methods

Quantifying Perceptual Distortion of Adversarial Examples

Authors: Matt Jordan, Naren Manoj, Surbhi Goel, Alexandros G. Dimakis | Published: 2019-02-21
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

Wasserstein Adversarial Examples via Projected Sinkhorn Iterations

Authors: Eric Wong, Frank R. Schmidt, J. Zico Kolter | Published: 2019-02-21 | Updated: 2020-01-18
Wasserstein Distance
Certified Robustness
Adversarial Attack Methods

There are No Bit Parts for Sign Bits in Black-Box Attacks

Authors: Abdullah Al-Dujaili, Una-May O'Reilly | Published: 2019-02-19 | Updated: 2019-04-03
Certified Robustness
Adversarial Attack Methods
Optimization Strategy

On Evaluating Adversarial Robustness

Authors: Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian Goodfellow, Aleksander Madry, Alexey Kurakin | Published: 2019-02-18 | Updated: 2019-02-20
Certified Robustness
Robustness Improvement Method
Adversarial Attack Methods

Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces

Authors: Mohammad Saidur Rahman, Mohsen Imani, Nate Mathews, Matthew Wright | Published: 2019-02-18 | Updated: 2020-10-28
Backdoor Detection
Adversarial Example
Adversarial Attack Methods

A Little Is Enough: Circumventing Defenses For Distributed Learning

Authors: Moran Baruch, Gilad Baruch, Yoav Goldberg | Published: 2019-02-16
Adversarial Learning
Adversarial attack
Adversarial Attack Methods

Mitigation of Adversarial Examples in RF Deep Classifiers Utilizing AutoEncoder Pre-training

Authors: Silvija Kokalj-Filipovic, Rob Miller, Nicholas Chang, Chi Leung Lau | Published: 2019-02-16
Poisoning
Adversarial attack
Adversarial Attack Methods