Adversarial Attack Methods

Adversarial Security Attacks and Perturbations on Machine Learning and Deep Learning Methods

Authors: Arif Siddiqi | Published: 2019-07-17
Poisoning
Adversarial Example
Adversarial Attack Methods

Latent Adversarial Defence with Boundary-guided Generation

Authors: Xiaowei Zhou, Ivor W. Tsang, Jie Yin | Published: 2019-07-16
Adversarial Example
Adversarial Attack Methods
Deep Learning Technology

Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving

Authors: Yulong Cao, Chaowei Xiao, Benjamin Cyr, Yimeng Zhou, Won Park, Sara Rampazzi, Qi Alfred Chen, Kevin Fu, Z. Morley Mao | Published: 2019-07-16 | Updated: 2019-08-20
Spoofing Attack Analysis
Adversarial Attack Methods
Optimization Methods

Bypassing Backdoor Detection Algorithms in Deep Learning

Authors: Te Juin Lester Tan, Reza Shokri | Published: 2019-05-31 | Updated: 2020-06-06
Pruning Method
Membership Inference
Adversarial Attack Methods

Identifying Classes Susceptible to Adversarial Attacks

Authors: Rangeet Pan, Md Johirul Islam, Shibbir Ahmed, Hridesh Rajan | Published: 2019-05-30
Vulnerability of Adversarial Examples
Adversarial Attack Methods
Deep Learning

Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and The Way Forward

Authors: Adnan Qayyum, Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-05-29
Backdoor Attack
Adversarial Example
Adversarial Attack Methods

Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking

Authors: Yunhan Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Zhenyu Zhong, Tao Wei | Published: 2019-05-27 | Updated: 2019-05-30
Cybersecurity
Tracking Method
Adversarial Attack Methods

Weight Map Layer for Noise and Adversarial Attack Robustness

Authors: Mohammed Amer, Tomás Maul | Published: 2019-05-02 | Updated: 2020-12-02
Robust Estimation
Future Research
Adversarial Attack Methods

NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks

Authors: Yandong Li, Lijun Li, Liqiang Wang, Tong Zhang, Boqing Gong | Published: 2019-05-01 | Updated: 2019-12-09
Adversarial Example
Adversarial Attack Methods
Deep Learning Technology

Detecting Adversarial Examples through Nonlinear Dimensionality Reduction

Authors: Francesco Crecchi, Davide Bacciu, Battista Biggio | Published: 2019-04-30 | Updated: 2019-05-01
Adversarial Example
Adversarial Attack Methods
Deep Learning Technology