Poisoning

GAMIN: An Adversarial Approach to Black-Box Model Inversion

Authors: Ulrich Aïvodji, Sébastien Gambs, Timon Ther | Published: 2019-09-26
Poisoning
Taxonomy of Attacks
Generative Adversarial Network

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection

Authors: Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen | Published: 2019-09-20
Poisoning
Adversarial Example
Adversarial attack

Defending Against Physically Realizable Attacks on Image Classification

Authors: Tong Wu, Liang Tong, Yevgeniy Vorobeychik | Published: 2019-09-20 | Updated: 2020-02-14
Poisoning
Taxonomy of Attacks
Adversarial attack

Adversarial Attacks and Defenses in Images, Graphs and Text: A Review

Authors: Han Xu, Yao Ma, Haochen Liu, Debayan Deb, Hui Liu, Jiliang Tang, Anil K. Jain | Published: 2019-09-17 | Updated: 2019-10-09
Poisoning
Adversarial Example
Adversarial attack

They Might NOT Be Giants: Crafting Black-Box Adversarial Examples with Fewer Queries Using Particle Swarm Optimization

Authors: Rayan Mosli, Matthew Wright, Bo Yuan, Yin Pan | Published: 2019-09-16
Poisoning
Model Robustness
Adversarial Perturbation Techniques

Node Injection Attacks on Graphs via Reinforcement Learning

Authors: Yiwei Sun, Suhang Wang, Xianfeng Tang, Tsung-Yu Hsieh, Vasant Honavar | Published: 2019-09-14
Node Injection Attack
Poisoning
Reinforcement Learning Algorithm

Sparse and Imperceivable Adversarial Attacks

Authors: Francesco Croce, Matthias Hein | Published: 2019-09-11
Poisoning
Attack Method
Machine Learning Method

PDA: Progressive Data Augmentation for General Robustness of Deep Neural Networks

Authors: Hang Yu, Aishan Liu, Xianglong Liu, Gengchao Li, Ping Luo, Ran Cheng, Jichen Yang, Chongzhi Zhang | Published: 2019-09-11 | Updated: 2020-02-24
Poisoning
Model Robustness
Attack Method

When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures

Authors: Gil Fidel, Ron Bitton, Asaf Shabtai | Published: 2019-09-08
Poisoning
Adversarial Example
Adversarial Example Detection

Spatiotemporally Constrained Action Space Attacks on Deep Reinforcement Learning Agents

Authors: Xian Yeow Lee, Sambit Ghadai, Kai Liang Tan, Chinmay Hegde, Soumik Sarkar | Published: 2019-09-05 | Updated: 2019-11-19
Poisoning
Attack Pattern Extraction
Adversarial Training