Adversarial Example

Adversarial Robustness is at Odds with Lazy Training

Authors: Yunjuan Wang, Enayat Ullah, Poorya Mianjy, Raman Arora | Published: 2022-06-18 | Updated: 2022-10-17
Algorithm Design
Adversarial Example
Adversarial Attack Detection

Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection

Authors: Abderrahmen Amich, Ata Kaboudi, Birhanu Eshete | Published: 2022-06-15
Robustness
Adversarial Example
Adversarial Attack Methods

Fusing Feature Engineering and Deep Learning: A Case Study for Malware Classification

Authors: Daniel Gibert, Carles Mateu, Jordi Planes, Quan Le | Published: 2022-06-12
Malware Detection
Adversarial Example
Deep Learning Method

A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning

Authors: Alberto Blanco-Justicia, David Sanchez, Josep Domingo-Ferrer, Krishnamurty Muralidhar | Published: 2022-06-09 | Updated: 2022-07-05
Privacy Assessment
Impact of Generalization
Adversarial Example

Improving Adversarial Robustness by Putting More Regularizations on Less Robust Samples

Authors: Dongyoon Yang, Insung Kong, Yongdai Kim | Published: 2022-06-07 | Updated: 2023-06-01
Robustness
Adversarial Example
Adversarial Attack Methods

Adversarial attacks and defenses in Speaker Recognition Systems: A survey

Authors: Jiahe Lan, Rui Zhang, Zheng Yan, Jie Wang, Yu Chen, Ronghui Hou | Published: 2022-05-27
Adversarial Example
Adversarial Attack Methods
Speech Recognition Process

EBM Life Cycle: MCMC Strategies for Synthesis, Defense, and Density Modeling

Authors: Mitch Hill, Jonathan Mitchell, Chu Chen, Yuan Du, Mubarak Shah, Song-Chun Zhu | Published: 2022-05-24
Training Data Generation
Future Research
Adversarial Example

Robust Sensible Adversarial Learning of Deep Neural Networks for Image Classification

Authors: Jungeum Kim, Xiao Wang | Published: 2022-05-20
Robustness Evaluation
Loss Function
Adversarial Example

Getting a-Round Guarantees: Floating-Point Attacks on Certified Robustness

Authors: Jiankai Jin, Olga Ohrimenko, Benjamin I. P. Rubinstein | Published: 2022-05-20 | Updated: 2024-09-09
Robustness Evaluation
Adversarial Example
Threat Model

Focused Adversarial Attacks

Authors: Thomas Cilloni, Charles Walter, Charles Fleming | Published: 2022-05-19
Attack Methods against DFL
Attack Type
Adversarial Example