Adversarial Attack Methods

Composite Adversarial Attacks

Authors: Xiaofeng Mao, Yuefeng Chen, Shuhui Wang, Hang Su, Yuan He, Hui Xue | Published: 2020-12-10
Taxonomy of Attacks
Adversarial Attack Methods
Defense Mechanism

One-Pixel Attack Deceives Computer-Assisted Diagnosis of Cancer

Authors: Joni Korpihalkola, Tuomo Sipola, Samir Puuska, Tero Kokkonen | Published: 2020-12-01 | Updated: 2021-11-02
Challenges of Data Labeling
Threats of Medical AI
Adversarial Attack Methods

Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems

Authors: AKM Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac | Published: 2020-10-07
Smart Healthcare
Adversarial Example
Adversarial Attack Methods

Manifold attack

Authors: Khanh-Hung Tran, Fred-Maurice Ngole-Mboula, Jean-Luc Starck | Published: 2020-09-13 | Updated: 2021-03-17
Membership Inference
Performance Evaluation
Adversarial Attack Methods

Quantifying Membership Inference Vulnerability via Generalization Gap and Other Model Metrics

Authors: Jason W. Bentley, Daniel Gibney, Gary Hoppenworth, Sumit Kumar Jha | Published: 2020-09-11
Membership Inference
Membership Disclosure Risk
Adversarial Attack Methods

Second Order Optimization for Adversarial Robustness and Interpretability

Authors: Theodoros Tsiligkaridis, Jay Roberts | Published: 2020-09-10
Performance Evaluation
Adversarial Attack Methods
Deep Learning Technology

Quantifying the Preferential Direction of the Model Gradient in Adversarial Training With Projected Gradient Descent

Authors: Ricardo Bigolin Lanfredi, Joyce D. Schroeder, Tolga Tasdizen | Published: 2020-09-10 | Updated: 2023-04-20
Poisoning
Performance Evaluation
Adversarial Attack Methods

Adversarial Attack on Large Scale Graph

Authors: Jintang Li, Tao Xie, Liang Chen, Fenfang Xie, Xiangnan He, Zibin Zheng | Published: 2020-09-08 | Updated: 2021-05-06
Graph Transformation
Adversarial Attack Methods
Structural Attack

Black Box to White Box: Discover Model Characteristics Based on Strategic Probing

Authors: Josh Kalin, Matthew Ciolino, David Noever, Gerry Dozier | Published: 2020-09-07
Adversarial Attack Methods
Machine Learning Method
Image Processing

Dynamically Computing Adversarial Perturbations for Recurrent Neural Networks

Authors: Shankar A. Deka, Dušan M. Stipanović, Claire J. Tomlin | Published: 2020-09-07
Multi-Class Classification
Adversarial Example
Adversarial Attack Methods