Adversarial attack

URET: Universal Robustness Evaluation Toolkit (for Evasion)

Authors: Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy, Masha Zorin | Published: 2023-08-03
Data Generation
Adversarial Example
Adversarial attack

Isolation and Induction: Training Robust Deep Neural Networks against Model Stealing Attacks

Authors: Jun Guo, Aishan Liu, Xingyu Zheng, Siyuan Liang, Yisong Xiao, Yichao Wu, Xianglong Liu | Published: 2023-08-02 | Updated: 2023-08-03
Adversarial Example
Adversarial attack
Watermark Robustness

Robust Linear Regression: Phase-Transitions and Precise Tradeoffs for General Norms

Authors: Elvis Dohmatob, Meyer Scetbon | Published: 2023-08-01
Adversarial attack
Optimization Methods
Linear Model

Doubly Robust Instance-Reweighted Adversarial Training

Authors: Daouda Sow, Sen Lin, Zhangyang Wang, Yingbin Liang | Published: 2023-08-01
Adversarial attack
Optimization Methods
Deep Learning Method

A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks

Authors: Khushnaseeb Roshan, Aasim Zafar, Shiekh Burhan Ul Haque | Published: 2023-07-31
Data Preprocessing
Adversarial attack
Deep Learning Method

On Neural Network approximation of ideal adversarial attack and convergence of adversarial training

Authors: Rajdeep Haldar, Qifan Song | Published: 2023-07-30
Convergence Property
Adversarial attack
Optimization Methods

Adversarial Learning in Real-World Fraud Detection: Challenges and Perspectives

Authors: Danele Lunghi, Alkis Simitsis, Olivier Caelen, Gianluca Bontempi | Published: 2023-07-03
Adversarial Example
Adversarial attack
Threat modeling

Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks

Authors: Pranav Dahiya, Ilia Shumailov, Ross Anderson | Published: 2023-06-24 | Updated: 2024-02-10
Algorithm Design
Adversarial attack
Statistical Testing

Boosting Model Inversion Attacks with Adversarial Examples

Authors: Shuai Zhou, Tianqing Zhu, Dayong Ye, Xin Yu, Wanlei Zhou | Published: 2023-06-24
Poisoning
Adversarial Example
Adversarial attack

Creating Valid Adversarial Examples of Malware

Authors: Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia | Published: 2023-06-23
Malware Classification
Malware Detection Method
Adversarial attack