Defense Method

Robustness for Non-Parametric Classification: A Generic Attack and Defense

Authors: Yao-Yuan Yang, Cyrus Rashtchian, Yizhen Wang, Kamalika Chaudhuri | Published: 2019-06-07 | Updated: 2020-02-24
Robust Classification
Adversarial Learning
Defense Method

On Configurable Defense against Adversarial Example Attacks

Authors: Bo Luo, Min Li, Yu Li, Qiang Xu | Published: 2018-12-06
Adversarial Example
Adversarial Learning
Defense Method

Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples

Authors: Huangyi Ge, Sze Yiu Chau, Bruno Ribeiro, Ninghui Li | Published: 2018-12-05 | Updated: 2020-01-20
Certified Robustness
Adversarial Example
Defense Method

Adversarial Machine Learning And Speech Emotion Recognition: Utilizing Generative Adversarial Networks For Robustness

Authors: Siddique Latif, Rajib Rana, Junaid Qadir | Published: 2018-11-28 | Updated: 2018-12-30
Certified Robustness
Robustness Improvement
Defense Method

Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition

Authors: Jenn-Bing Ong, Wee-Keong Ng, C. -C. Jay Kuo | Published: 2018-11-20 | Updated: 2018-12-11
Robust Classification
Adversarial Learning
Defense Method

Lightweight Lipschitz Margin Training for Certified Defense against Adversarial Examples

Authors: Hajime Ono, Tsubasa Takahashi, Kazuya Kakizaki | Published: 2018-11-20
Robustness Improvement
Adversarial Learning
Defense Method

The Taboo Trap: Behavioural Detection of Adversarial Samples

Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2018-11-18 | Updated: 2019-11-21
Backdoor Detection
Encryption Technology
Defense Method

Robust Website Fingerprinting Through the Cache Occupancy Channel

Authors: Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom | Published: 2018-11-17 | Updated: 2019-02-21
Fingerprinting Method
Attack Evaluation
Defense Method

FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning

Authors: Faiq Khalid, Muhammmad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique | Published: 2018-11-04
Model Extraction Attack
Attack Evaluation
Defense Method

QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks

Authors: Faiq Khalid, Hassan Ali, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-04 | Updated: 2020-05-14
Certified Robustness
Quantization Method
Defense Method