Adversarial Example Detection

Law and Adversarial Machine Learning

Authors: Ram Shankar Siva Kumar, David R. O'Brien, Kendra Albert, Salome Vilojen | Published: 2018-10-25 | Updated: 2018-12-05
Digital Forensics
Adversarial Example Detection
Legal Liability

One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy

Authors: Jingkang Wang, Ruoxi Jia, Gerald Friedland, Bo Li, Costas Spanos | Published: 2018-10-23
Robust Estimation
Adversarial Example Detection
Adversarial Transferability

A Training-based Identification Approach to VIN Adversarial Examples

Authors: Yingdi Wang, Wenjia Niu, Tong Chen, Yingxiao Xiang, Jingjing Liu, Gang Li, Jiqiang Liu | Published: 2018-10-18
Robustness Improvement Method
Adversarial Example Detection
Adversarial Attack Methods

DeepImageSpam: Deep Learning based Image Spam Detection

Authors: Amara Dinesh Kumar, Vinayakumar R, Soman KP | Published: 2018-10-03
Spam Classification Model
Adversarial Example Detection
Research Methodology

Structure-Preserving Transformation: Generating Diverse and Transferable Adversarial Examples

Authors: Dan Peng, Zizhan Zheng, Xiaofeng Zhang | Published: 2018-09-08 | Updated: 2018-12-22
Certified Robustness
Adversarial Example Detection
Adversarial Transferability

Are adversarial examples inevitable?

Authors: Ali Shafahi, W. Ronny Huang, Christoph Studer, Soheil Feizi, Tom Goldstein | Published: 2018-09-06 | Updated: 2020-02-03
Robustness Analysis
Adversarial Example
Adversarial Example Detection

HASP: A High-Performance Adaptive Mobile Security Enhancement Against Malicious Speech Recognition

Authors: Zirui Xu, Fuxun Yu, Chenchen Liu, Xiang Chen | Published: 2018-09-04
Robustness Improvement Method
Performance Evaluation
Adversarial Example Detection

MULDEF: Multi-model-based Defense Against Adversarial Examples for Neural Networks

Authors: Siwakorn Srisakaokul, Yuhao Zhang, Zexuan Zhong, Wei Yang, Tao Xie, Bo Li | Published: 2018-08-31 | Updated: 2019-07-27
Model Ensemble
Adversarial Example Detection
Adversarial Learning

Security and Privacy Issues in Deep Learning

Authors: Ho Bae, Jaehee Jang, Dahuin Jung, Hyemi Jang, Heonseok Ha, Hyungyu Lee, Sungroh Yoon | Published: 2018-07-31 | Updated: 2021-03-10
Differential Privacy
Adversarial Example Detection
Adversarial attack

A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks

Authors: Kimin Lee, Kibok Lee, Honglak Lee, Jinwoo Shin | Published: 2018-07-10 | Updated: 2018-10-27
Model Evaluation
Adversarial Example Detection
Adversarial Learning