Adversarial Example

ATRO: Adversarial Training with a Rejection Option

Authors: Masahiro Kato, Zhenghang Cui, Yoshihiro Fukuhara | Published: 2020-10-24
Adversarial Example
Adversarial Example Detection
Machine Learning Algorithm

Certified Distributional Robustness on Smoothed Classifiers

Authors: Jungang Yang, Liyao Xiang, Ruidong Chen, Yukun Wang, Wei Wang, Xinbing Wang | Published: 2020-10-21 | Updated: 2021-04-30
Dataset evaluation
Robustness Improvement Method
Adversarial Example

A Survey of Machine Learning Techniques in Adversarial Image Forensics

Authors: Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo | Published: 2020-10-19
Poisoning
Adversarial Learning
Adversarial Example

Towards Resistant Audio Adversarial Examples

Authors: Tom Dörr, Karla Markert, Nicolas M. Müller, Konstantin Böttinger | Published: 2020-10-14
Generalization Performance
Adversarial Example
Deep Fake Audio Evaluation

Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems

Authors: AKM Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac | Published: 2020-10-07
Smart Healthcare
Adversarial Example
Adversarial Attack Methods

Do Wider Neural Networks Really Help Adversarial Robustness?

Authors: Boxi Wu, Jinghui Chen, Deng Cai, Xiaofei He, Quanquan Gu | Published: 2020-10-03 | Updated: 2021-08-14
Robustness Evaluation
Adversarial Example
Deep Learning Technology

Deep learning for time series classification

Authors: Hassan Ismail Fawaz | Published: 2020-10-01
Model Architecture
Adversarial Example
Deep Learning Method

DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles

Authors: Huanrui Yang, Jingyang Zhang, Hongliang Dong, Nathan Inkawhich, Andrew Gardner, Andrew Touchet, Wesley Wilkes, Heath Berry, Hai Li | Published: 2020-09-30 | Updated: 2020-10-18
Robustness Improvement Method
Adversarial Example
Vulnerability Assessment Method

Generating End-to-End Adversarial Examples for Malware Classifiers Using Explainability

Authors: Ishai Rosenberg, Shai Meir, Jonathan Berrebi, Ilay Gordon, Guillaume Sicard, Eli David | Published: 2020-09-28 | Updated: 2022-06-01
Malware Classification
Model Interpretability
Adversarial Example

Beneficial Perturbations Network for Defending Adversarial Examples

Authors: Shixian Wen, Amanda Rios, Laurent Itti | Published: 2020-09-27 | Updated: 2021-09-13
Adversarial Example
Vulnerability of Adversarial Examples
Deep Learning