Adversarial Attack Methods

Security Matters: A Survey on Adversarial Machine Learning

Authors: Guofu Li, Pengjia Zhu, Jin Li, Zhemin Yang, Ning Cao, Zhiyi Chen | Published: 2018-10-16 | Updated: 2018-10-23
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

The Adversarial Attack and Detection under the Fisher Information Metric

Authors: Chenxiao Zhao, P. Thomas Fletcher, Mixue Yu, Yaxin Peng, Guixu Zhang, Chaomin Shen | Published: 2018-10-09 | Updated: 2019-02-09
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

Adversarial Examples – A Complete Characterisation of the Phenomenon

Authors: Alexandru Constantin Serban, Erik Poll, Joost Visser | Published: 2018-10-02 | Updated: 2019-02-17
Robustness Improvement Method
Adversarial Example
Adversarial Attack Methods

Improving the Generalization of Adversarial Training with Domain Adaptation

Authors: Chuanbiao Song, Kun He, Liwei Wang, John E. Hopcroft | Published: 2018-10-01 | Updated: 2019-03-15
Robustness Improvement Method
Adversarial Learning
Adversarial Attack Methods

Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks

Authors: Kenneth T. Co, Luis Muñoz-González, Sixte de Maupeou, Emil C. Lupu | Published: 2018-09-30 | Updated: 2019-11-23
Certified Robustness
Robustness Improvement Method
Adversarial Attack Methods

Statistical Inference Attack Against PHY-layer Key Extraction and Countermeasures

Authors: Rui Zhu, Tao Shu, Huirong Fu | Published: 2018-09-29
Security of Signal Transmission
Adversarial Attack Methods
Communication Model

Adversarial Attacks and Defences: A Survey

Authors: Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, Debdeep Mukhopadhyay | Published: 2018-09-28
Model Inversion
Adversarial Example
Adversarial Attack Methods

Explainable Black-Box Attacks Against Model-based Authentication

Authors: Washington Garcia, Joseph I. Choi, Suman K. Adari, Somesh Jha, Kevin R. B. Butler | Published: 2018-09-28
XAI (Explainable AI)
Model Inversion
Adversarial Attack Methods

Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward

Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2018-09-26
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

Fast Geometrically-Perturbed Adversarial Faces

Authors: Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2018-09-24 | Updated: 2018-09-28
Robustness Improvement Method
Adversarial Attack Methods
Generative Model