Adversarial Spectrum Attack Detection

Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics

Authors: Wenwei Zhao, Xiaowen Li, Shangqing Zhao, Jie Xu, Yao Liu, Zhuo Lu | Published: 2024-02-14
Adversarial Example
Adversarial Spectrum Attack Detection
Adversarial Attack Detection

Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks

Authors: Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash | Published: 2023-07-30
Cybersecurity
Adversarial Spectrum Attack Detection
Watermark Robustness

Adversarial training for tabular data with attack propagation

Authors: Tiago Leon Melo, João Bravo, Marco O. P. Sampaio, Paolo Romano, Hugo Ferreira, João Tiago Ascensão, Pedro Bizarro | Published: 2023-07-28
Adversarial Example
Adversarial Spectrum Attack Detection
Time-Related Features

Query-Free Evasion Attacks Against Machine Learning-Based Malware Detectors with Generative Adversarial Networks

Authors: Daniel Gibert, Jordi Planes, Quan Le, Giulio Zizzo | Published: 2023-06-16
Poisoning
Malware Propagation Means
Adversarial Spectrum Attack Detection

Smoothness Analysis of Adversarial Training

Authors: Sekitoshi Kanai, Masanori Yamada, Hiroshi Takahashi, Yuki Yamanaka, Yasutoshi Ida | Published: 2021-03-02 | Updated: 2023-03-06
Data Dependency
Adversarial Example
Adversarial Spectrum Attack Detection

Towards adversarial robustness with 01 loss neural networks

Authors: Yunzhe Xue, Meiyan Xie, Usman Roshan | Published: 2020-08-20
Adversarial Spectrum Attack Detection
Deep Learning
Computational Complexity

Adversarial VC-dimension and Sample Complexity of Neural Networks

Authors: Zetong Qi, T. J. Wilder | Published: 2019-12-18
Robustness
Adversarial Spectrum Attack Detection
Continuous Linear Function

Potential adversarial samples for white-box attacks

Authors: Amir Nazemi, Paul Fieguth | Published: 2019-12-13
Robustness
Adversarial Spectrum Attack Detection
Deep Learning Method

Detecting and Correcting Adversarial Images Using Image Processing Operations

Authors: Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen | Published: 2019-12-11 | Updated: 2019-12-30
Adversarial Spectrum Attack Detection
Deep Learning Method
Watermarking Technology

Principal Component Properties of Adversarial Samples

Authors: Malhar Jere, Sandro Herbig, Christine Lind, Farinaz Koushanfar | Published: 2019-12-07
Robustness
Adversarial Example
Adversarial Spectrum Attack Detection