Defense Mechanism

Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey

Authors: Vikas Hassija, Vinay Chamola, Adhar Agrawal, Adit Goyal, Nguyen Cong Luong, Dusit Niyato, F. Richard Yu, Mohsen Guizani | Published: 2021-05-04
DoS Mitigation
Cyber Attack
Defense Mechanism

Influence Based Defense Against Data Poisoning Attacks in Online Learning

Authors: Sanjay Seetharaman, Shubham Malaviya, Rosni KV, Manish Shukla, Sachin Lodha | Published: 2021-04-24
Data Protection Method
Poisoning
Defense Mechanism

Random Noise Defense Against Query-Based Black-Box Attacks

Authors: Zeyu Qin, Yanbo Fan, Hongyuan Zha, Baoyuan Wu | Published: 2021-04-23 | Updated: 2021-10-30
Convergence Analysis
Adversarial Example Detection
Defense Mechanism

Jacobian Regularization for Mitigating Universal Adversarial Perturbations

Authors: Kenneth T. Co, David Martinez Rego, Emil C. Lupu | Published: 2021-04-21 | Updated: 2021-09-13
UAP Training Method
Adversarial Example Detection
Defense Mechanism

Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems

Authors: Yue Gao, Ilia Shumailov, Kassem Fawaz | Published: 2021-04-18 | Updated: 2022-06-19
Adversarial Example
Adversarial Example Detection
Defense Mechanism

Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack

Authors: Luca Pajola, Mauro Conti | Published: 2021-04-13
Poisoning Attack
Threat Model
Defense Mechanism

Sparse Coding Frontend for Robust Neural Networks

Authors: Can Bakiskan, Metehan Cekic, Ahmet Dundar Sezer, Upamanyu Madhow | Published: 2021-04-12
Poisoning
Adversarial Example Detection
Defense Mechanism

Adversarial Attacks and Defenses for Speech Recognition Systems

Authors: Piotr Żelasko, Sonal Joshi, Yiwen Shao, Jesus Villalba, Jan Trmal, Najim Dehak, Sanjeev Khudanpur | Published: 2021-03-31
Vulnerability of Adversarial Examples
Literature List
Defense Mechanism

Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models

Authors: Josh Kalin, David Noever, Matthew Ciolino, Dominick Hambrick, Gerry Dozier | Published: 2021-03-29
Model Protection Methods
Vulnerability of Adversarial Examples
Defense Mechanism

Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels — Attacks and Defenses

Authors: Saurav Maji, Utsav Banerjee, Anantha P. Chandrakasan | Published: 2021-03-26
Model Protection Methods
Vulnerability Assessment Method
Defense Mechanism