Adversarial attack

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection

Authors: Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen | Published: 2019-09-20
Poisoning
Adversarial Example
Adversarial attack

Defending Against Physically Realizable Attacks on Image Classification

Authors: Tong Wu, Liang Tong, Yevgeniy Vorobeychik | Published: 2019-09-20 | Updated: 2020-02-14
Poisoning
Taxonomy of Attacks
Adversarial attack

Absum: Simple Regularization Method for Reducing Structural Sensitivity of Convolutional Neural Networks

Authors: Sekitoshi Kanai, Yasutoshi Ida, Yasuhiro Fujiwara, Masanori Yamada, Shuichi Adachi | Published: 2019-09-19
Experimental Validation
Adversarial Example
Adversarial attack

Adversarial Attacks and Defenses in Images, Graphs and Text: A Review

Authors: Han Xu, Yao Ma, Haochen Liu, Debayan Deb, Hui Liu, Jiliang Tang, Anil K. Jain | Published: 2019-09-17 | Updated: 2019-10-09
Poisoning
Adversarial Example
Adversarial attack

Exploring the Robustness of NMT Systems to Nonsensical Inputs

Authors: Akshay Chaturvedi, Abijith KP, Utpal Garain | Published: 2019-08-03 | Updated: 2020-02-28
BLEU Score Evaluation
Adversarial attack
Machine Learning

Graph Interpolating Activation Improves Both Natural and Robust Accuracies in Data-Efficient Deep Learning

Authors: Bao Wang, Stanley J. Osher | Published: 2019-07-16
Adversarial attack
Deep Learning Method
Weight Update Method

Recovery Guarantees for Compressible Signals with Adversarial Noise

Authors: Jasjeet Dhaliwal, Kyle Hambrook | Published: 2019-07-15 | Updated: 2019-08-07
Algorithm Design
Adversarial attack
Deep Learning Method

Measuring the Transferability of Adversarial Examples

Authors: Deyan Petrov, Timothy M. Hospedales | Published: 2019-07-14
Adversarial Example
Adversarial attack
Deep Learning Method

Stateful Detection of Black-Box Adversarial Attacks

Authors: Steven Chen, Nicholas Carlini, David Wagner | Published: 2019-07-12
Poisoning
Attack Detection
Adversarial attack

Adversarial Objects Against LiDAR-Based Autonomous Driving Systems

Authors: Yulong Cao, Chaowei Xiao, Dawei Yang, Jing Fang, Ruigang Yang, Mingyan Liu, Bo Li | Published: 2019-07-11
Adversarial Example
Adversarial attack
Deep Learning Method