Adversarial attack

Gradient-based adversarial attacks on categorical sequence models via traversing an embedded world

Authors: Ivan Fursov, Alexey Zaytsev, Nikita Kluchnikov, Andrey Kravchenko, Evgeny Burnaev | Published: 2020-03-09 | Updated: 2020-10-12
Adversarial Example
Adversarial attack
Generative Model

Graph Universal Adversarial Attacks: A Few Bad Actors Ruin Graph Learning Models

Authors: Xiao Zang, Yi Xie, Jie Chen, Bo Yuan | Published: 2020-02-12 | Updated: 2021-06-23
Graph Neural Network
Graph Privacy
Adversarial attack

Fundamental Tradeoffs between Invariance and Sensitivity to Adversarial Perturbations

Authors: Florian Tramèr, Jens Behrmann, Nicholas Carlini, Nicolas Papernot, Jörn-Henrik Jacobsen | Published: 2020-02-11 | Updated: 2020-08-04
Robustness Evaluation
Adversarial Example
Adversarial attack

Robustness of Bayesian Neural Networks to Gradient-Based Attacks

Authors: Ginevra Carbone, Matthew Wicker, Luca Laurenti, Andrea Patane, Luca Bortolussi, Guido Sanguinetti | Published: 2020-02-11 | Updated: 2020-06-24
Robustness Evaluation
Robustness Improvement Method
Adversarial attack

Adversarial Attacks on Linear Contextual Bandits

Authors: Evrard Garcelon, Baptiste Roziere, Laurent Meunier, Jean Tarbouriech, Olivier Teytaud, Alessandro Lazaric, Matteo Pirotta | Published: 2020-02-10 | Updated: 2020-10-23
Advice Provision
Robustness Evaluation
Adversarial attack

Adversarial Data Encryption

Authors: Yingdong Hu, Liang Zhang, Wei Shan, Xiaoxiao Qin, Jing Qi, Zhenzhou Wu, Yang Yuan | Published: 2020-02-10 | Updated: 2020-02-11
Poisoning
Adversarial attack
Cryptography

Manipulating Reinforcement Learning: Poisoning Attacks on Cost Signals

Authors: Yunhan Huang, Quanyan Zhu | Published: 2020-02-07 | Updated: 2020-07-20
Q-Learning Algorithm
Convergence Analysis
Adversarial attack

On the Resilience of Biometric Authentication Systems against Random Inputs

Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar | Published: 2020-01-13 | Updated: 2020-01-24
Poisoning
Adversarial attack
Machine Learning

Membership Inference Attacks Against Object Detection Models

Authors: Yeachan Park, Myungjoo Kang | Published: 2020-01-12 | Updated: 2020-01-28
Membership Inference
Adversarial attack
Machine Learning

Fast is better than free: Revisiting adversarial training

Authors: Eric Wong, Leslie Rice, J. Zico Kolter | Published: 2020-01-12
Adversarial Example
Adversarial attack
Deep Learning Method