Jacobian Regularization for Mitigating Universal Adversarial Perturbations Authors: Kenneth T. Co, David Martinez Rego, Emil C. Lupu | Published: 2021-04-21 | Updated: 2021-09-13 UAP Training MethodAdversarial Example DetectionDefense Mechanism 2021.04.21 2025.05.28 Literature Database
Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems Authors: Yue Gao, Ilia Shumailov, Kassem Fawaz | Published: 2021-04-18 | Updated: 2022-06-19 Adversarial ExampleAdversarial Example DetectionDefense Mechanism 2021.04.18 2025.05.28 Literature Database
Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack Authors: Luca Pajola, Mauro Conti | Published: 2021-04-13 Poisoning AttackThreat ModelDefense Mechanism 2021.04.13 2025.05.28 Literature Database
Sparse Coding Frontend for Robust Neural Networks Authors: Can Bakiskan, Metehan Cekic, Ahmet Dundar Sezer, Upamanyu Madhow | Published: 2021-04-12 PoisoningAdversarial Example DetectionDefense Mechanism 2021.04.12 2025.05.28 Literature Database
Adversarial Attacks and Defenses for Speech Recognition Systems Authors: Piotr Żelasko, Sonal Joshi, Yiwen Shao, Jesus Villalba, Jan Trmal, Najim Dehak, Sanjeev Khudanpur | Published: 2021-03-31 Vulnerability of Adversarial ExamplesLiterature ListDefense Mechanism 2021.03.31 2025.05.28 Literature Database
Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models Authors: Josh Kalin, David Noever, Matthew Ciolino, Dominick Hambrick, Gerry Dozier | Published: 2021-03-29 Model Protection MethodsVulnerability of Adversarial ExamplesDefense Mechanism 2021.03.29 2025.05.28 Literature Database
Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels — Attacks and Defenses Authors: Saurav Maji, Utsav Banerjee, Anantha P. Chandrakasan | Published: 2021-03-26 Model Protection MethodsVulnerability Assessment MethodDefense Mechanism 2021.03.26 2025.05.28 Literature Database
Black-box Detection of Backdoor Attacks with Limited Information and Data Authors: Yinpeng Dong, Xiao Yang, Zhijie Deng, Tianyu Pang, Zihao Xiao, Hang Su, Jun Zhu | Published: 2021-03-24 Backdoor AttackOptimization MethodsDefense Mechanism 2021.03.24 2025.05.28 Literature Database
A Challenge Obfuscating Interface for Arbiter PUF Variants against Machine Learning Attacks Authors: Yu Zhuang, Khalid T. Mursi, Li Gaoxiang | Published: 2021-03-24 Optimization MethodsVulnerability Assessment MethodDefense Mechanism 2021.03.24 2025.05.28 Literature Database
With False Friends Like These, Who Can Notice Mistakes? Authors: Lue Tao, Lei Feng, Jinfeng Yi, Songcan Chen | Published: 2020-12-29 | Updated: 2021-12-13 Adversarial ExampleAdversarial LearningDefense Mechanism 2020.12.29 2025.05.28 Literature Database