Adversarial Example Detection

Jacobian Regularization for Mitigating Universal Adversarial Perturbations

Authors: Kenneth T. Co, David Martinez Rego, Emil C. Lupu | Published: 2021-04-21 | Updated: 2021-09-13
UAP Training Method
Adversarial Example Detection
Defense Mechanism

Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems

Authors: Yue Gao, Ilia Shumailov, Kassem Fawaz | Published: 2021-04-18 | Updated: 2022-06-19
Adversarial Example
Adversarial Example Detection
Defense Mechanism

Sparse Coding Frontend for Robust Neural Networks

Authors: Can Bakiskan, Metehan Cekic, Ahmet Dundar Sezer, Upamanyu Madhow | Published: 2021-04-12
Poisoning
Adversarial Example Detection
Defense Mechanism

Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain

Authors: Jinyu Tian, Jiantao Zhou, Yuanman Li, Jia Duan | Published: 2021-03-07
Attack Scenario Analysis
Adversarial Example Detection
Adversarial Learning

Identifying Untrustworthy Predictions in Neural Networks by Geometric Gradient Analysis

Authors: Leo Schwinn, An Nguyen, René Raab, Leon Bungert, Daniel Tenbrinck, Dario Zanca, Martin Burger, Bjoern Eskofier | Published: 2021-02-24
Model Performance Evaluation
Trust Evaluation Module
Adversarial Example Detection

Adversarial Robustness with Non-uniform Perturbations

Authors: Ecenaz Erdemir, Jeffrey Bickford, Luca Melis, Sergul Aydore | Published: 2021-02-24 | Updated: 2021-10-29
Malware Detection Method
Adversarial Example
Adversarial Example Detection

Adversarially Robust Learning with Unknown Perturbation Sets

Authors: Omar Montasser, Steve Hanneke, Nathan Srebro | Published: 2021-02-03
Model Performance Evaluation
Adversarial Example Detection
Adversarial Training

ATRO: Adversarial Training with a Rejection Option

Authors: Masahiro Kato, Zhenghang Cui, Yoshihiro Fukuhara | Published: 2020-10-24
Adversarial Example
Adversarial Example Detection
Machine Learning Algorithm

ATOM: Robustifying Out-of-distribution Detection Using Outlier Mining

Authors: Jiefeng Chen, Yixuan Li, Xi Wu, Yingyu Liang, Somesh Jha | Published: 2020-06-26 | Updated: 2021-06-30
Out-of-Distribution Detection
Adversarial Example Detection
Adversarial attack

Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?

Authors: Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu | Published: 2020-06-26 | Updated: 2022-07-28
Backdoor Attack
Adversarial Example Detection
Adversarial attack