Adversarial Attack Methods

White-Box Target Attack for EEG-Based BCI Regression Problems

Authors: Lubin Meng, Chin-Teng Lin, Tzyy-Ring Jung, Dongrui Wu | Published: 2019-11-07
Model Performance Evaluation
Adversarial Attack Methods
Knowledge Transferability

Confidence-Calibrated Adversarial Training: Generalizing to Unseen Attacks

Authors: David Stutz, Matthias Hein, Bernt Schiele | Published: 2019-10-14 | Updated: 2020-06-30
Poisoning
Attack Evaluation
Adversarial Attack Methods

Hear “No Evil”, See “Kenansville”: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems

Authors: Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor | Published: 2019-10-11
Attack Evaluation
Adversarial Attack Methods
Speech Recognition Technology

Adversarial Training: embedding adversarial perturbations into the parameter space of a neural network to build a robust system

Authors: Shixian Wen, Laurent Itti | Published: 2019-10-09
Adversarial Example
Adversarial Attack Methods
Adaptive Adversarial Training

Deep Latent Defence

Authors: Giulio Zizzo, Chris Hankin, Sergio Maffeis, Kevin Jones | Published: 2019-10-09 | Updated: 2020-09-27
Adversarial Example
Adversarial Attack Methods
Adaptive Adversarial Training

Adversarial Learning of Deepfakes in Accounting

Authors: Marco Schreyer, Timur Sattarov, Bernd Reimer, Damian Borth | Published: 2019-10-09
Data Integrity Constraints
Adversarial Attack Methods
Generative Adversarial Network

SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations

Authors: Ali Dabouei, Sobhan Soleymani, Fariborz Taherkhani, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2019-10-08
Attack Evaluation
Adversarial Example
Adversarial Attack Methods

Adversarial Examples for Cost-Sensitive Classifiers

Authors: Gavin S. Hartnett, Andrew J. Lohn, Alexander P. Sedlack | Published: 2019-10-04
Poisoning
Attack Evaluation
Adversarial Attack Methods

BUZz: BUffer Zones for defending adversarial examples in image classification

Authors: Kaleel Mahmood, Phuong Ha Nguyen, Lam M. Nguyen, Thanh Nguyen, Marten van Dijk | Published: 2019-10-03 | Updated: 2020-06-16
Poisoning
Attack Evaluation
Adversarial Attack Methods

Perturbations are not Enough: Generating Adversarial Examples with Spatial Distortions

Authors: He Zhao, Trung Le, Paul Montague, Olivier De Vel, Tamas Abraham, Dinh Phung | Published: 2019-10-03
Adversarial Example
Adversarial Attack Methods
Generative Adversarial Network