Adversarial Learning

With False Friends Like These, Who Can Notice Mistakes?

Authors: Lue Tao, Lei Feng, Jinfeng Yi, Songcan Chen | Published: 2020-12-29 | Updated: 2021-12-13
Adversarial Example
Adversarial Learning
Defense Mechanism

Autoencoding Variational Autoencoder

Authors: A. Taylan Cemgil, Sumedh Ghaisas, Krishnamurthy Dvijotham, Sven Gowal, Pushmeet Kohli | Published: 2020-12-07
Adversarial Learning
Generative Model Characteristics
Self-Learning Method

TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic

Authors: Peter Jachim, Filipo Sharevski, Paige Treebridge | Published: 2020-12-04 | Updated: 2020-12-07
Content Moderation
Security Analysis
Adversarial Learning

Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers

Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-12-03 | Updated: 2021-03-09
Attack Method
Adversarial Example
Adversarial Learning

Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme

Authors: Kunjal Panchal | Published: 2020-10-29
Password Guessing
Adversarial Learning
Generative Model Characteristics

Understanding Catastrophic Overfitting in Single-step Adversarial Training

Authors: Hoki Kim, Woojin Lee, Jaewook Lee | Published: 2020-10-05 | Updated: 2020-12-15
Poisoning
Robustness Evaluation
Adversarial Learning

Adversarially Training for Audio Classifiers

Authors: Raymel Alfonso Sallo, Mohammad Esmaeilpour, Patrick Cardinal | Published: 2020-08-26 | Updated: 2020-10-25
Adversarial Example
Adversarial Learning
Speech Signal Processing

Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning

Authors: Yinghua Zhang, Yangqiu Song, Jian Liang, Kun Bai, Qiang Yang | Published: 2020-08-25
Poisoning
Adversarial Learning
Deep Learning

Near Optimal Adversarial Attacks on Stochastic Bandits and Defenses with Smoothed Responses

Authors: Shiliang Zuo | Published: 2020-08-21 | Updated: 2024-03-14
Game Theory
Attack Method
Adversarial Learning

Defending Distributed Classifiers Against Data Poisoning Attacks

Authors: Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie | Published: 2020-08-21
Poisoning
Attack Method
Adversarial Learning