Adversarial Learning

Fooling LIME and SHAP: Adversarial Attacks on Post hoc Explanation Methods

Authors: Dylan Slack, Sophie Hilgard, Emily Jia, Sameer Singh, Himabindu Lakkaraju | Published: 2019-11-06 | Updated: 2020-02-03
XAI (Explainable AI)
Adversarial Learning
Attacks on Explainability

Adversarial Example Detection by Classification for Deep Speech Recognition

Authors: Saeid Samizade, Zheng-Hua Tan, Chao Shen, Xiaohong Guan | Published: 2019-10-22
Adversarial Learning
Adversarial Transferability
Malfunction of Voice Assistants

White-Box Adversarial Defense via Self-Supervised Data Estimation

Authors: Zudi Lin, Hanspeter Pfister, Ziming Zhang | Published: 2019-09-13
Security Analysis
Performance Evaluation
Adversarial Learning

Defending Against Adversarial Attacks by Suppressing the Largest Eigenvalue of Fisher Information Matrix

Authors: Chaomin Shen, Yaxin Peng, Guixu Zhang, Jinsong Fan | Published: 2019-09-13
Performance Evaluation
Adversarial Example
Adversarial Learning

Black-box Adversarial ML Attack on Modulation Classification

Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-08-01
Information Security
Adversarial Learning
Deep Learning Method

Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT

Authors: Alireza Nooraiepour, Waheed U. Bajwa, Narayan B. Mandayam | Published: 2019-08-01 | Updated: 2020-07-04
Adversarial Learning
Physical layer security
Communication Model

Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding

Authors: Utku Ozbulak, Arnout Van Messem, Wesley De Neve | Published: 2019-07-30
Taxonomy of Attacks
Adversarial Example
Adversarial Learning

Adversarial Robustness Assessment: Why both $L_0$ and $L_\infty$ Attacks Are Necessary

Authors: Shashank Kotyan, Danilo Vasconcellos Vargas | Published: 2019-06-14 | Updated: 2020-07-16
Adversarial Example
Adversarial Learning
Defense Method

Evolutionary Trigger Set Generation for DNN Black-Box Watermarking

Authors: Jia Guo, Miodrag Potkonjak | Published: 2019-06-11 | Updated: 2021-02-14
DNN IP Protection Method
Adversarial Learning
Deep Learning

Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective

Authors: Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, Xue Lin | Published: 2019-06-10 | Updated: 2019-10-14
Adversarial Learning
Selection and Evaluation of Optimization Algorithms
Defense Method