Adversarial Attack Methods

Building Robust Ensembles via Margin Boosting

Authors: Dinghuai Zhang, Hongyang Zhang, Aaron Courville, Yoshua Bengio, Pradeep Ravikumar, Arun Sai Suggala | Published: 2022-06-07
Poisoning
Robustness
Adversarial Attack Methods

Improving Adversarial Robustness by Putting More Regularizations on Less Robust Samples

Authors: Dongyoon Yang, Insung Kong, Yongdai Kim | Published: 2022-06-07 | Updated: 2023-06-01
Robustness
Adversarial Example
Adversarial Attack Methods

White-box Membership Attack Against Machine Learning Based Retinopathy Classification

Authors: Mounia Hamidouche, Reda Bellafqira, Gwenolé Quellec, Gouenou Coatrieux | Published: 2022-05-30
Attack Methods against DFL
Adversarial Attack Methods

Adversarial attacks and defenses in Speaker Recognition Systems: A survey

Authors: Jiahe Lan, Rui Zhang, Zheng Yan, Jie Wang, Yu Chen, Ronghui Hou | Published: 2022-05-27
Adversarial Example
Adversarial Attack Methods
Speech Recognition Process

A General Framework for Evaluating Robustness of Combinatorial Optimization Solvers on Graphs

Authors: Han Lu, Zenan Li, Runzhong Wang, Qibing Ren, Junchi Yan, Xiaokang Yang | Published: 2021-12-28 | Updated: 2022-06-04
Algorithm Design
Robustness Evaluation
Adversarial Attack Methods

SoK: A Study of the Security on Voice Processing Systems

Authors: Robert Chang, Logan Kuo, Arthur Liu, Nader Sehatbakhsh | Published: 2021-12-24
Privacy Risk Management
Adversarial Attack Methods
Defense Method

Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach

Authors: James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen | Published: 2021-12-03
Prompt Injection
Malware Detection Method
Adversarial Attack Methods

Adversarial Attacks Against Deep Generative Models on Data: A Survey

Authors: Hui Sun, Tianqing Zhu, Zhiqiu Zhang, Dawei Jin. Ping Xiong, Wanlei Zhou | Published: 2021-12-01
Data Generation
Backdoor Attack
Adversarial Attack Methods

Robust and Information-theoretically Safe Bias Classifier against Adversarial Attacks

Authors: Lijia Yu, Xiao-Shan Gao | Published: 2021-11-08 | Updated: 2022-02-14
Generalization Performance
Adversarial Attack Methods
Defense Mechanism

Get a Model! Model Hijacking Attack Against Machine Learning Models

Authors: Ahmed Salem, Michael Backes, Yang Zhang | Published: 2021-11-08
Dataset evaluation
Backdoor Attack
Adversarial Attack Methods