Adversarial Example

How many dimensions are required to find an adversarial example?

Authors: Charles Godfrey, Henry Kvinge, Elise Bishoff, Myles Mckay, Davis Brown, Tim Doster, Eleanor Byler | Published: 2023-03-24 | Updated: 2023-04-11
Convergence Property
Adversarial Example
Machine Learning Technology

Certified Robust Neural Networks: Generalization and Corruption Resistance

Authors: Amine Bennouna, Ryan Lucas, Bart Van Parys | Published: 2023-03-03 | Updated: 2023-05-18
Poisoning Attack
Loss Function
Adversarial Example

Generalization Bounds for Adversarial Contrastive Learning

Authors: Xin Zou, Weiwei Liu | Published: 2023-02-21
Watermarking
Model Performance Evaluation
Adversarial Example

On the Discredibility of Membership Inference Attacks

Authors: Shahbaz Rezaei, Xin Liu | Published: 2022-12-06 | Updated: 2023-04-28
Subpopulation Characteristics
Membership Disclosure Risk
Adversarial Example

Hijack Vertical Federated Learning Models As One Party

Authors: Pengyu Qiu, Xuhong Zhang, Shouling Ji, Changjiang Li, Yuwen Pu, Xing Yang, Ting Wang | Published: 2022-12-01 | Updated: 2024-02-16
Adversarial Example
Optimization Problem
Untargeted Toxicity Attack

Evolution of Neural Tangent Kernels under Benign and Adversarial Training

Authors: Noel Loo, Ramin Hasani, Alexander Amini, Daniela Rus | Published: 2022-10-21
Adversarial Example
Adversarial Attack Methods
Deep Learning Method

Scaling Adversarial Training to Large Perturbation Bounds

Authors: Sravanti Addepalli, Samyak Jain, Gaurang Sriramanan, R. Venkatesh Babu | Published: 2022-10-18
Adversarial Example
Adversarial Attack Methods
Deep Learning Method

Towards Generating Adversarial Examples on Mixed-type Data

Authors: Han Xu, Menghai Pan, Zhimeng Jiang, Huiyuan Chen, Xiaoting Li, Mahashweta Das, Hao Yang | Published: 2022-10-17
Adversarial Example
Adversarial Attack Methods
Selection and Evaluation of Optimization Algorithms

Preprocessors Matter! Realistic Decision-Based Attacks on Machine Learning Systems

Authors: Chawin Sitawarin, Florian Tramèr, Nicholas Carlini | Published: 2022-10-07 | Updated: 2023-07-20
DNN IP Protection Method
Model Extraction Attack
Adversarial Example

A Black-Box Attack on Optical Character Recognition Systems

Authors: Samet Bayram, Kenneth Barner | Published: 2022-08-30
Adversarial Example
Adversarial attack
Optimization Methods