Adversarial Perturbation Techniques

Copy and Paste: A Simple But Effective Initialization Method for Black-Box Adversarial Attacks

Authors: Thomas Brunner, Frederik Diehl, Alois Knoll | Published: 2019-06-14 | Updated: 2019-12-29
Initialization Method
Adversarial Perturbation Techniques
Optimization Problem

ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation

Authors: Yuzhe Yang, Guo Zhang, Dina Katabi, Zhi Xu | Published: 2019-05-28
Model Evaluation
Performance Evaluation
Adversarial Perturbation Techniques

Snooping Attacks on Deep Reinforcement Learning

Authors: Matthew Inkawhich, Yiran Chen, Hai Li | Published: 2019-05-28 | Updated: 2020-01-15
Reinforcement Learning Method
Taxonomy of Attacks
Adversarial Perturbation Techniques

Semantics Preserving Adversarial Learning

Authors: Ousmane Amadou Dia, Elnaz Barshan, Reza Babanezhad | Published: 2019-03-10 | Updated: 2019-12-21
Robustness Improvement Method
Adversarial Example Detection
Adversarial Perturbation Techniques

Adversarial Examples on Graph Data: Deep Insights into Attack and Defense

Authors: Huijun Wu, Chen Wang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, Liming Zhu | Published: 2019-03-05 | Updated: 2019-05-22
Certified Robustness
Adversarial Example
Adversarial Perturbation Techniques

PuVAE: A Variational Autoencoder to Purify Adversarial Examples

Authors: Uiwon Hwang, Jaewoo Park, Hyemi Jang, Sungroh Yoon, Nam Ik Cho | Published: 2019-03-02
Poisoning
Robustness Improvement Method
Adversarial Perturbation Techniques

Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications

Authors: Bryse Flowers, R. Michael Buehrer, William C. Headley | Published: 2019-03-01
Adversarial Learning
Adversarial Perturbation Techniques
Wireless Channel Detection

CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks

Authors: Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique | Published: 2019-01-28 | Updated: 2019-05-24
Adversarial Example
Adversarial Perturbation Techniques
Adversarial attack

On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples

Authors: Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu | Published: 2018-03-26
Adversarial Example Detection
Adversarial Perturbation Techniques
Machine Learning Technology

Clipping free attacks against artificial neural networks

Authors: Boussad Addad, Jerome Kodjabachian, Christophe Meyer | Published: 2018-03-26 | Updated: 2018-03-28
Adversarial Example Detection
Adversarial Perturbation Techniques
Machine Learning Technology