Vulnerability of Adversarial Examples

MISA: Online Defense of Trojaned Models using Misattributions

Authors: Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha | Published: 2021-03-29 | Updated: 2021-09-23
Vulnerability of Adversarial Examples
Anomaly Detection Method
Threat modeling

Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models

Authors: Josh Kalin, David Noever, Matthew Ciolino, Dominick Hambrick, Gerry Dozier | Published: 2021-03-29
Model Protection Methods
Vulnerability of Adversarial Examples
Defense Mechanism

Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond

Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus | Published: 2021-03-25
Vulnerability of Adversarial Examples
Optimization Methods
Wireless Channel Detection

Maximum Mean Discrepancy Test is Aware of Adversarial Attacks

Authors: Ruize Gao, Feng Liu, Jingfeng Zhang, Bo Han, Tongliang Liu, Gang Niu, Masashi Sugiyama | Published: 2020-10-22 | Updated: 2021-07-11
Vulnerability of Adversarial Examples
Analysis of Detection Methods
Statistical Methods

Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence

Authors: Chang Liao, Yao Cheng, Chengfang Fang, Jie Shi | Published: 2020-09-28 | Updated: 2020-10-08
Relationship between Robustness and Privacy
Vulnerability of Adversarial Examples
Research Methodology

Beneficial Perturbations Network for Defending Adversarial Examples

Authors: Shixian Wen, Amanda Rios, Laurent Itti | Published: 2020-09-27 | Updated: 2021-09-13
Adversarial Example
Vulnerability of Adversarial Examples
Deep Learning

Addressing Neural Network Robustness with Mixup and Targeted Labeling Adversarial Training

Authors: Alfred Laugros, Alice Caplier, Matthieu Ospici | Published: 2020-08-19
Robustness Improvement Method
Adversarial Example
Vulnerability of Adversarial Examples

Synthesizing Unrestricted False Positive Adversarial Objects Using Generative Models

Authors: Martin Kotuliak, Sandro E. Schoenborn, Andrei Dan | Published: 2020-05-19
Attack Evaluation
Adversarial Example
Vulnerability of Adversarial Examples

Identifying Audio Adversarial Examples via Anomalous Pattern Detection

Authors: Victor Akinwande, Celia Cintas, Skyler Speakman, Srihari Sridharan | Published: 2020-02-13 | Updated: 2020-07-25
Vulnerability of Adversarial Examples
Adversarial Attack Methods
Machine Learning Application

A Survey of Game Theoretic Approaches for Adversarial Machine Learning in Cybersecurity Tasks

Authors: Prithviraj Dasgupta, Joseph B. Collins | Published: 2019-12-04
Data Generation
Vulnerability of Adversarial Examples
Adversarial Transferability