Adversarial Example

Btech thesis report on adversarial attack detection and purification of adverserially attacked images

Authors: Dvij Kalaria | Published: 2022-05-09
Attack Detection
Adversarial Example
Adaptive Adversarial Training

Overparameterized Linear Regression under Adversarial Attacks

Authors: Antônio H. Ribeiro, Thomas B. Schön | Published: 2022-04-13 | Updated: 2023-01-27
Adversarial Example
Machine Learning Application
Linear Model

NICGSlowDown: Evaluating the Efficiency Robustness of Neural Image Caption Generation Models

Authors: Simin Chen, Zihe Song, Mirazul Haque, Cong Liu, Wei Yang | Published: 2022-03-29
Model DoS
Adversarial Example
Adversarial Learning

An integrated Auto Encoder-Block Switching defense approach to prevent adversarial attacks

Authors: Anirudh Yadav, Ashutosh Upadhyay, S. Sharanya | Published: 2022-03-11
Training Data Generation
Adversarial Example
Defense Method

Adversarial Patterns: Building Robust Android Malware Classifiers

Authors: Dipkamal Bhusal, Nidhi Rastogi | Published: 2022-03-04 | Updated: 2024-04-12
Malware Classification
Adversarial Example
Defense Method

Why adversarial training can hurt robust accuracy

Authors: Jacob Clarysse, Julia Hörrmann, Fanny Yang | Published: 2022-03-03
Dataset Generation
Robustness
Adversarial Example

Addressing Adversarial Machine Learning Attacks in Smart Healthcare Perspectives

Authors: Arawinkumaar Selvakkumar, Shantanu Pal, Zahra Jadidi | Published: 2021-12-16
Adversarial Example
Adversarial Training
Machine Learning Application

Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review

Authors: Huda Ali Alatwi, Charles Morisset | Published: 2021-12-06
Poisoning
Adversarial Example
Adversarial Attack Detection

Evaluating Adversarial Attacks on ImageNet: A Reality Check on Misclassification Classes

Authors: Utku Ozbulak, Maura Pintor, Arnout Van Messem, Wesley De Neve | Published: 2021-11-22
Poisoning
Adversarial Example
Adversarial attack

A Review of Adversarial Attack and Defense for Classification Methods

Authors: Yao Li, Minhao Cheng, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-11-18
Adversarial Example
Adversarial attack
Defense Mechanism