Adversarial Learning

Learning More Robust Features with Adversarial Training

Authors: Shuangtao Li, Yuanke Chen, Yanlin Peng, Lin Bai | Published: 2018-04-20
Adversarial Learning
Adversarial Learning
Watermarking Technology

Adversarial Attacks Against Medical Deep Learning Systems

Authors: Samuel G. Finlayson, Hyung Won Chung, Isaac S. Kohane, Andrew L. Beam | Published: 2018-04-15 | Updated: 2019-02-04
Adversarial Learning
Adversarial Attack Analysis
Deep Learning

Adversarial Training Versus Weight Decay

Authors: Angus Galloway, Thomas Tanay, Graham W. Taylor | Published: 2018-04-10 | Updated: 2018-07-23
Certified Robustness
Adversarial Learning
Adversarial attack

Bypassing Feature Squeezing by Increasing Adversary Strength

Authors: Yash Sharma, Pin-Yu Chen | Published: 2018-03-27
Experimental Validation
Adversarial Learning
Adversarial attack

A Dynamic-Adversarial Mining Approach to the Security of Machine Learning

Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Lingyu Lyua, Jiashun Chen | Published: 2018-03-24
Model Extraction Attack
Detection of Model Extraction Attacks
Adversarial Learning

Improving DNN Robustness to Adversarial Attacks using Jacobian Regularization

Authors: Daniel Jakubovitz, Raja Giryes | Published: 2018-03-23 | Updated: 2019-05-28
Certified Robustness
Adversarial Learning
Regularization

Adversarial Defense based on Structure-to-Signal Autoencoders

Authors: Joachim Folz, Sebastian Palacio, Joern Hees, Damian Borth, Andreas Dengel | Published: 2018-03-21
Poisoning
Adversarial Learning
Image Feature Extraction

Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks

Authors: Octavian Suciu, Radu Mărginean, Yiğitcan Kaya, Hal Daumé III, Tudor Dumitraş | Published: 2018-03-19 | Updated: 2019-03-08
Performance Evaluation Metrics
Adversarial Example
Adversarial Learning

Adversarial Logit Pairing

Authors: Harini Kannan, Alexey Kurakin, Ian Goodfellow | Published: 2018-03-16
Certified Robustness
Adversarial Learning
Machine Learning Method

Vulnerability of Deep Learning

Authors: Richard Kenway | Published: 2018-03-16
Convergence Property
Adversarial Example
Adversarial Learning