Adversarial Example

Adversarial Training and Robustness for Multiple Perturbations

Authors: Florian Tramèr, Dan Boneh | Published: 2019-04-30 | Updated: 2019-10-18
Robust Estimation
Adversarial Example
Adversarial Attack Methods

Adversarial Training for Free!

Authors: Ali Shafahi, Mahyar Najibi, Amin Ghiasi, Zheng Xu, John Dickerson, Christoph Studer, Larry S. Davis, Gavin Taylor, Tom Goldstein | Published: 2019-04-29 | Updated: 2019-11-20
Poisoning
Adversarial Example
Adaptive Adversarial Training

A Robust Approach for Securing Audio Classification Against Adversarial Attacks

Authors: Mohammad Esmaeilpour, Patrick Cardinal, Alessandro Lameiras Koerich | Published: 2019-04-24 | Updated: 2019-11-25
Backdoor Attack
Adversarial Example
Adversarial Attack Methods

ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks

Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah | Published: 2019-04-17
Adversarial Example
Adversarial Learning
Machine Learning Method

Malware Evasion Attack and Defense

Authors: Yonghong Huang, Utkarsh Verma, Celeste Fralick, Gabriel Infante-Lopez, Brajesh Kumarz, Carl Woodward | Published: 2019-04-07 | Updated: 2019-04-16
Malware Detection
Adversarial Example
Adversarial Attack Detection

HopSkipJumpAttack: A Query-Efficient Decision-Based Attack

Authors: Jianbo Chen, Michael I. Jordan, Martin J. Wainwright | Published: 2019-04-03 | Updated: 2020-04-28
Adversarial Example
Adversarial attack
Distance Evaluation Method

Generating Adversarial Examples With Conditional Generative Adversarial Net

Authors: Ping Yu, Kaitao Song, Jianfeng Lu | Published: 2019-03-18
Certified Robustness
Adversarial Example
Adversarial Attack Detection

Adversarial Attacks on Deep Neural Networks for Time Series Classification

Authors: Hassan Ismail Fawaz, Germain Forestier, Jonathan Weber, Lhassane Idoumghar, Pierre-Alain Muller | Published: 2019-03-17 | Updated: 2019-04-26
Adversarial Example
Adversarial Learning
Adversarial Attack Detection

Adversarial Examples on Graph Data: Deep Insights into Attack and Defense

Authors: Huijun Wu, Chen Wang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, Liming Zhu | Published: 2019-03-05 | Updated: 2019-05-22
Certified Robustness
Adversarial Example
Adversarial Perturbation Techniques

Adversarial Attacks on Time Series

Authors: Fazle Karim, Somshubra Majumdar, Houshang Darabi | Published: 2019-02-27 | Updated: 2019-03-01
Model Extraction Attack
Adversarial Example
Adversarial Learning