Adversarial Perturbation Techniques

Analysis of Random Perturbations for Robust Convolutional Neural Networks

Authors: Adam Dziedzic, Sanjay Krishnan | Published: 2020-02-08 | Updated: 2020-06-07
Robustness Improvement Method
Adversarial Example
Adversarial Perturbation Techniques

Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels

Authors: Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus | Published: 2020-02-05 | Updated: 2020-02-13
Adversarial Perturbation Techniques
Adversarial Transferability
Communication Loss

Minimax Defense against Gradient-based Adversarial Attacks

Authors: Blerta Lindqvist, Rauf Izmailov | Published: 2020-02-04
Adversarial Perturbation Techniques
Adversarial Transferability
Effectiveness Analysis of Defense Methods

FastWordBug: A Fast Method To Generate Adversarial Text Against NLP Applications

Authors: Dou Goodman, Lv Zhonghou, Wang minghua | Published: 2020-01-31
Text Perturbation Method
Adversarial Perturbation Techniques
Natural Language Processing

Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain

Authors: Yigit Alparslan, Ken Alparslan, Jeremy Keim-Shenk, Shweta Khade, Rachel Greenstadt | Published: 2020-01-30 | Updated: 2021-02-08
Robustness Improvement Method
Adversarial Example
Adversarial Perturbation Techniques

A4 : Evading Learning-based Adblockers

Authors: Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq | Published: 2020-01-29
Adversarial Perturbation Techniques
Adversarial Transferability
Machine Learning Technology

Explainable Deep Convolutional Candlestick Learner

Authors: Jun-Hao Chen, Samuel Yen-Chi Chen, Yun-Cheng Tsai, Chih-Shiang Shur | Published: 2020-01-08 | Updated: 2020-05-29
Candlestick Pattern
Adversarial Perturbation Techniques
Machine Learning Application

They Might NOT Be Giants: Crafting Black-Box Adversarial Examples with Fewer Queries Using Particle Swarm Optimization

Authors: Rayan Mosli, Matthew Wright, Bo Yuan, Yin Pan | Published: 2019-09-16
Poisoning
Model Robustness
Adversarial Perturbation Techniques

Improving Black-box Adversarial Attacks with a Transfer-based Prior

Authors: Shuyu Cheng, Yinpeng Dong, Tianyu Pang, Hang Su, Jun Zhu | Published: 2019-06-17 | Updated: 2020-07-26
Poisoning
Adversarial Perturbation Techniques
Optimization Problem

Towards Stable and Efficient Training of Verifiably Robust Neural Networks

Authors: Huan Zhang, Hongge Chen, Chaowei Xiao, Sven Gowal, Robert Stanforth, Bo Li, Duane Boning, Cho-Jui Hsieh | Published: 2019-06-14 | Updated: 2019-11-27
Dataset Analysis
Stability Assessment
Adversarial Perturbation Techniques