Adversarial Attack Methods

Security of Distributed Machine Learning: A Game-Theoretic Approach to Design Secure DSVM

Authors: Rui Zhang, Quanyan Zhu | Published: 2020-03-08 | Updated: 2020-04-26
Game Theory
Poisoning
Adversarial Attack Methods

Identifying Audio Adversarial Examples via Anomalous Pattern Detection

Authors: Victor Akinwande, Celia Cintas, Skyler Speakman, Srihari Sridharan | Published: 2020-02-13 | Updated: 2020-07-25
Vulnerability of Adversarial Examples
Adversarial Attack Methods
Machine Learning Application

Over-the-Air Adversarial Flickering Attacks against Video Recognition Networks

Authors: Roi Pony, Itay Naeh, Shie Mannor | Published: 2020-02-12 | Updated: 2021-06-04
Video Classification
Expression of Gratitude
Adversarial Attack Methods

Attack based DoS attack detection using multiple classifier

Authors: Mohamed Abushwereb, Muhannad Mustafa, Mouhammd Al-kasassbeh, Malik Qasaimeh | Published: 2020-01-16
DDoS Attack Detection
Network Threat Detection
Adversarial Attack Methods

Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning

Authors: Roei Schuster, Tal Schuster, Yoav Meri, Vitaly Shmatikov | Published: 2020-01-14
Membership Inference
Adversarial Attack Methods
Statistical Analysis

Advbox: a toolbox to generate adversarial examples that fool neural networks

Authors: Dou Goodman, Hao Xin, Wang Yang, Wu Yuesheng, Xiong Junfeng, Zhang Huan | Published: 2020-01-13 | Updated: 2020-08-26
Poisoning
Adversarial Example
Adversarial Attack Methods

Playing it Safe: Adversarial Robustness with an Abstain Option

Authors: Cassidy Laidlaw, Soheil Feizi | Published: 2019-11-25
Adversarial Learning
Adversarial Example
Adversarial Attack Methods

One Man’s Trash is Another Man’s Treasure: Resisting Adversarial Examples by Adversarial Examples

Authors: Chang Xiao, Changxi Zheng | Published: 2019-11-25 | Updated: 2019-11-27
Adversarial Example
Adversarial Attack Methods
Effectiveness Analysis of Defense Methods

Adversarial Attack with Pattern Replacement

Authors: Ziang Dong, Liang Mao, Shiliang Sun | Published: 2019-11-25
Model Design
Adversarial Attack Methods
Research Methodology

Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Networks for Secure Inference

Authors: Wei-An Lin, Yogesh Balaji, Pouya Samangouei, Rama Chellappa | Published: 2019-11-23
Model Design
Adversarial Attack Methods
Research Methodology