Adversarial Learning

On the Robustness of Domain Constraints

Authors: Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick McDaniel | Published: 2021-05-18 | Updated: 2021-11-07
Data Integrity Constraints
Membership Inference
Adversarial Learning

Undistillable: Making A Nasty Teacher That CANNOT teach students

Authors: Haoyu Ma, Tianlong Chen, Ting-Kuei Hu, Chenyu You, Xiaohui Xie, Zhangyang Wang | Published: 2021-05-16
Adversarial Learning
Deep Learning Technology
Self-Supervised Learning

Cybersecurity Anomaly Detection in Adversarial Environments

Authors: David A. Bierbrauer, Alexander Chang, Will Kritzer, Nathaniel D. Bastian | Published: 2021-05-14 | Updated: 2021-11-02
ML-Based IDS
Model Selection
Adversarial Learning

Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain

Authors: Jinyu Tian, Jiantao Zhou, Yuanman Li, Jia Duan | Published: 2021-03-07
Attack Scenario Analysis
Adversarial Example Detection
Adversarial Learning

With False Friends Like These, Who Can Notice Mistakes?

Authors: Lue Tao, Lei Feng, Jinfeng Yi, Songcan Chen | Published: 2020-12-29 | Updated: 2021-12-13
Adversarial Example
Adversarial Learning
Defense Mechanism

Autoencoding Variational Autoencoder

Authors: A. Taylan Cemgil, Sumedh Ghaisas, Krishnamurthy Dvijotham, Sven Gowal, Pushmeet Kohli | Published: 2020-12-07
Adversarial Learning
Generative Model Characteristics
Self-Learning Method

TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic

Authors: Peter Jachim, Filipo Sharevski, Paige Treebridge | Published: 2020-12-04 | Updated: 2020-12-07
Content Moderation
Security Analysis
Adversarial Learning

Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers

Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-12-03 | Updated: 2021-03-09
Attack Method
Adversarial Example
Adversarial Learning

Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme

Authors: Kunjal Panchal | Published: 2020-10-29
Password Guessing
Adversarial Learning
Generative Model Characteristics

Understanding Catastrophic Overfitting in Single-step Adversarial Training

Authors: Hoki Kim, Woojin Lee, Jaewook Lee | Published: 2020-10-05 | Updated: 2020-12-15
Poisoning
Robustness Evaluation
Adversarial Learning