Adversarial Attack Methods

Adversarial Robustness of Flow-Based Generative Models

Authors: Phillip Pope, Yogesh Balaji, Soheil Feizi | Published: 2019-11-20
Trade-off Analysis
Model Design
Adversarial Attack Methods

Generate (non-software) Bugs to Fool Classifiers

Authors: Hiromu Yakura, Youhei Akimoto, Jun Sakuma | Published: 2019-11-20
Model Performance Evaluation
Adversarial Example
Adversarial Attack Methods

Towards non-toxic landscapes: Automatic toxic comment detection using DNN

Authors: Ashwin Geet D'Sa, Irina Illina, Dominique Fohr | Published: 2019-11-19 | Updated: 2020-09-16
Class Imbalance
Model Performance Evaluation
Adversarial Attack Methods

Deep Detector Health Management under Adversarial Campaigns

Authors: Javier Echauz, Keith Kenemer, Sarfaraz Hussein, Jay Dhaliwal, Saurabh Shintre, Slawomir Grzonkowski, Andrew Gardner | Published: 2019-11-19
Class Imbalance
Adversarial Example
Adversarial Attack Methods

Attack on Grid Event Cause Analysis: An Adversarial Machine Learning Approach

Authors: Iman Niazazari, Hanif Livani | Published: 2019-11-19 | Updated: 2019-11-25
Adversarial Example
Adversarial Attack Methods
Effectiveness Analysis of Defense Methods

WITCHcraft: Efficient PGD attacks with random step size

Authors: Ping-Yeh Chiang, Jonas Geiping, Micah Goldblum, Tom Goldstein, Renkun Ni, Steven Reich, Ali Shafahi | Published: 2019-11-18
Convergence Analysis
Reinforcement Learning Attack
Adversarial Attack Methods

Can You Really Backdoor Federated Learning?

Authors: Ziteng Sun, Peter Kairouz, Ananda Theertha Suresh, H. Brendan McMahan | Published: 2019-11-18 | Updated: 2019-12-02
Adversarial Attack Methods
Threat Model
Effectiveness Analysis of Defense Methods

A New Ensemble Adversarial Attack Powered by Long-term Gradient Memories

Authors: Zhaohui Che, Ali Borji, Guangtao Zhai, Suiyi Ling, Jing Li, Patrick Le Callet | Published: 2019-11-18
Backdoor Attack
Model Performance Evaluation
Adversarial Attack Methods

Black-Box Adversarial Attack with Transferable Model-based Embedding

Authors: Zhichao Huang, Tong Zhang | Published: 2019-11-17 | Updated: 2020-01-05
Adversarial Example
Adversarial Attack Methods
Knowledge Transferability

Defending Against Model Stealing Attacks with Adaptive Misinformation

Authors: Sanjay Kariyappa, Moinuddin K Qureshi | Published: 2019-11-16
Adversarial Example
Adversarial Attack Methods
Effectiveness Analysis of Defense Methods