Adversarial attack

Sparsity Turns Adversarial: Energy and Latency Attacks on Deep Neural Networks

Authors: Sarada Krithivasan, Sanchari Sen, Anand Raghunathan | Published: 2020-06-14 | Updated: 2020-09-14
Sparsity Optimization
Adversarial Example
Adversarial attack

Stochastic Security: Adversarial Defense Using Long-Run Dynamics of Energy-Based Models

Authors: Mitch Hill, Jonathan Mitchell, Song-Chun Zhu | Published: 2020-05-27 | Updated: 2021-03-18
Adversarial Example
Adversarial attack
Machine Learning Technology

Effects of Forward Error Correction on Communications Aware Evasion Attacks

Authors: Matthew DelVecchio, Bryse Flowers, William C. Headley | Published: 2020-05-27
Adversarial attack
Machine Learning Technology
Communication Loss

A Protection against the Extraction of Neural Network Models

Authors: Hervé Chabanne, Vincent Despiegel, Linda Guiga | Published: 2020-05-26 | Updated: 2020-07-31
Adversarial attack
Machine Learning
Machine Learning Technology

Keyed Non-Parametric Hypothesis Tests

Authors: Yao Cheng, Cheng-Kang Chu, Hsiao-Ying Lin, Marius Lombard-Platet, David Naccache | Published: 2020-05-25
Poisoning
Adversarial attack
Machine Learning Technology

Adversarial Feature Selection against Evasion Attacks

Authors: Fei Zhang, Patrick P. K. Chan, Battista Biggio, Daniel S. Yeung, Fabio Roli | Published: 2020-05-25
Poisoning
Adversarial attack
Feature Extraction Method

Adversarial Attack on Hierarchical Graph Pooling Neural Networks

Authors: Haoteng Tang, Guixiang Ma, Yurong Chen, Lei Guo, Wei Wang, Bo Zeng, Liang Zhan | Published: 2020-05-23
Poisoning
Adversarial Example
Adversarial attack

PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking

Authors: Chong Xiang, Arjun Nitin Bhagoji, Vikash Sehwag, Prateek Mittal | Published: 2020-05-17 | Updated: 2021-03-31
Robustness Analysis
Adversarial attack
Feature Extraction Method

Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection

Authors: Olga Petrova, Karel Durkota, Galina Alperovich, Karel Horak, Michal Najman, Branislav Bosansky, Viliam Lisy | Published: 2020-04-22
Adversarial attack
Selection and Evaluation of Optimization Algorithms
Anomaly Detection Algorithm

Provably robust deep generative models

Authors: Filipe Condessa, Zico Kolter | Published: 2020-04-22
Robustness Improvement Method
Adversarial attack
Deep Learning Method