Adversarial Perturbation Techniques

Towards Stable and Efficient Training of Verifiably Robust Neural Networks

Authors: Huan Zhang, Hongge Chen, Chaowei Xiao, Sven Gowal, Robert Stanforth, Bo Li, Duane Boning, Cho-Jui Hsieh | Published: 2019-06-14 | Updated: 2019-11-27
Dataset Analysis
Stability Assessment
Adversarial Perturbation Techniques

Copy and Paste: A Simple But Effective Initialization Method for Black-Box Adversarial Attacks

Authors: Thomas Brunner, Frederik Diehl, Alois Knoll | Published: 2019-06-14 | Updated: 2019-12-29
Initialization Method
Adversarial Perturbation Techniques
Optimization Problem

ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation

Authors: Yuzhe Yang, Guo Zhang, Dina Katabi, Zhi Xu | Published: 2019-05-28
Model Evaluation
Performance Evaluation
Adversarial Perturbation Techniques

Snooping Attacks on Deep Reinforcement Learning

Authors: Matthew Inkawhich, Yiran Chen, Hai Li | Published: 2019-05-28 | Updated: 2020-01-15
Reinforcement Learning Method
Taxonomy of Attacks
Adversarial Perturbation Techniques

Semantics Preserving Adversarial Learning

Authors: Ousmane Amadou Dia, Elnaz Barshan, Reza Babanezhad | Published: 2019-03-10 | Updated: 2019-12-21
Robustness Improvement Method
Adversarial Example Detection
Adversarial Perturbation Techniques

Adversarial Examples on Graph Data: Deep Insights into Attack and Defense

Authors: Huijun Wu, Chen Wang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, Liming Zhu | Published: 2019-03-05 | Updated: 2019-05-22
Certified Robustness
Adversarial Example
Adversarial Perturbation Techniques

PuVAE: A Variational Autoencoder to Purify Adversarial Examples

Authors: Uiwon Hwang, Jaewoo Park, Hyemi Jang, Sungroh Yoon, Nam Ik Cho | Published: 2019-03-02
Poisoning
Robustness Improvement Method
Adversarial Perturbation Techniques

Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications

Authors: Bryse Flowers, R. Michael Buehrer, William C. Headley | Published: 2019-03-01
Adversarial Learning
Adversarial Perturbation Techniques
Wireless Channel Detection

CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks

Authors: Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique | Published: 2019-01-28 | Updated: 2019-05-24
Adversarial Example
Adversarial Perturbation Techniques
Adversarial attack

On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples

Authors: Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu | Published: 2018-03-26
Adversarial Example Detection
Adversarial Perturbation Techniques
Machine Learning Technology