Adversarial attack

Attack Agnostic Statistical Method for Adversarial Detection

Authors: Sambuddha Saha, Aashish Kumar, Pratyush Sahay, George Jose, Srinivas Kruthiventi, Harikrishna Muralidhara | Published: 2019-11-22
Adversarial Example
Adversarial attack
Research Methodology

Minimalistic Attacks: How Little it Takes to Fool a Deep Reinforcement Learning Policy

Authors: Xinghua Qu, Zhu Sun, Yew-Soon Ong, Abhishek Gupta, Pengfei Wei | Published: 2019-11-10 | Updated: 2020-10-29
Reinforcement Learning Algorithm
Reinforcement Learning Attack
Adversarial attack

Imperceptible Adversarial Attacks on Tabular Data

Authors: Vincent Ballet, Xavier Renard, Jonathan Aigrain, Thibault Laugel, Pascal Frossard, Marcin Detyniecki | Published: 2019-11-08 | Updated: 2019-12-13
Vulnerability of Tabular Data
Adversarial Example
Adversarial attack

Hidden Trigger Backdoor Attacks

Authors: Aniruddha Saha, Akshayvarun Subramanya, Hamed Pirsiavash | Published: 2019-09-30 | Updated: 2019-12-21
Training Data Generation
Backdoor Attack
Adversarial attack

Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML

Authors: Sijia Liu, Songtao Lu, Xiangyi Chen, Yao Feng, Kaidi Xu, Abdullah Al-Dujaili, Minyi Hong, Una-May O'Reilly | Published: 2019-09-30 | Updated: 2020-06-17
Poisoning
Convergence Analysis
Adversarial attack

Impact of Low-bitwidth Quantization on the Adversarial Robustness for Embedded Neural Networks

Authors: Rémi Bernhard, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2019-09-27 | Updated: 2020-07-06
Adversarial Example
Adversarial attack
Quantization and Privacy

Lower Bounds on Adversarial Robustness from Optimal Transport

Authors: Arjun Nitin Bhagoji, Daniel Cullina, Prateek Mittal | Published: 2019-09-26 | Updated: 2019-10-30
Taxonomy of Attacks
Adversarial attack
Machine Learning Application

Probabilistic Modeling of Deep Features for Out-of-Distribution and Adversarial Detection

Authors: Nilesh A. Ahuja, Ibrahima Ndiour, Trushant Kalyanpur, Omesh Tickoo | Published: 2019-09-25
Out-of-Distribution Detection
Adversarial attack
Generative Model Characteristics

Mixup Inference: Better Exploiting Mixup to Defend Adversarial Attacks

Authors: Tianyu Pang, Kun Xu, Jun Zhu | Published: 2019-09-25 | Updated: 2020-02-20
Model Interpretability
Adversarial Example
Adversarial attack

Sign-OPT: A Query-Efficient Hard-label Adversarial Attack

Authors: Minhao Cheng, Simranjit Singh, Patrick Chen, Pin-Yu Chen, Sijia Liu, Cho-Jui Hsieh | Published: 2019-09-24 | Updated: 2020-02-14
Convergence Analysis
Taxonomy of Attacks
Adversarial attack