Defense Mechanism

Trace-Norm Adversarial Examples

Authors: Ehsan Kazemi, Thomas Kerdreux, Liqiang Wang | Published: 2020-07-02
Algorithm Design
Adversarial Attack Detection
Defense Mechanism

Deep Learning Defenses Against Adversarial Examples for Dynamic Risk Assessment

Authors: Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, Ines Goicoechea-Telleria, Raul Orduna-Urrutia | Published: 2020-07-02
Adversarial Example
Adversarial Attack Methods
Defense Mechanism

FDA3 : Federated Defense Against Adversarial Attacks for Cloud-Based IIoT Applications

Authors: Yunfei Song, Tian Liu, Tongquan Wei, Xiangfeng Wang, Zhe Tao, Mingsong Chen | Published: 2020-06-28
Adversarial Example
Adversarial attack
Defense Mechanism

Deep Partition Aggregation: Provable Defense against General Poisoning Attacks

Authors: Alexander Levine, Soheil Feizi | Published: 2020-06-26 | Updated: 2021-03-18
Algorithm Design
Poisoning
Defense Mechanism

Perceptual Adversarial Robustness: Defense Against Unseen Threat Models

Authors: Cassidy Laidlaw, Sahil Singla, Soheil Feizi | Published: 2020-06-22 | Updated: 2021-07-04
Poisoning
Adversarial Attack Methods
Defense Mechanism

Learning to Generate Noise for Multi-Attack Robustness

Authors: Divyam Madaan, Jinwoo Shin, Sung Ju Hwang | Published: 2020-06-22 | Updated: 2021-06-24
Adversarial Perturbation Techniques
Adversarial Attack Methods
Defense Mechanism

Systematic Attack Surface Reduction For Deployed Sentiment Analysis Models

Authors: Josh Kalin, David Noever, Gerry Dozier | Published: 2020-06-19
Attack Method
Adversarial Learning
Defense Mechanism

Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples

Authors: Kaleel Mahmood, Deniz Gurevin, Marten van Dijk, Phuong Ha Nguyen | Published: 2020-06-18 | Updated: 2021-05-20
Adversarial Example
Adversarial attack
Defense Mechanism

Adversarial Training is a Form of Data-dependent Operator Norm Regularization

Authors: Kevin Roth, Yannic Kilcher, Thomas Hofmann | Published: 2019-06-04 | Updated: 2020-10-23
Adversarial Training
Deep Learning Technology
Defense Mechanism

Unrestricted Adversarial Examples

Authors: Tom B. Brown, Nicholas Carlini, Chiyuan Zhang, Catherine Olsson, Paul Christiano, Ian Goodfellow | Published: 2018-09-22
Robustness Improvement Method
Adversarial Attack Methods
Defense Mechanism