Adversarial Attack Methods

Adversarial Training and Robustness for Multiple Perturbations

Authors: Florian Tramèr, Dan Boneh | Published: 2019-04-30 | Updated: 2019-10-18
Robust Estimation
Adversarial Example
Adversarial Attack Methods

A Robust Approach for Securing Audio Classification Against Adversarial Attacks

Authors: Mohammad Esmaeilpour, Patrick Cardinal, Alessandro Lameiras Koerich | Published: 2019-04-24 | Updated: 2019-11-25
Backdoor Attack
Adversarial Example
Adversarial Attack Methods

A Target-Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning

Authors: Shahbaz Rezaei, Xin Liu | Published: 2019-04-08 | Updated: 2020-01-29
Model evaluation methods
Adversarial Attack Methods
Deep Learning Technology

Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

Authors: Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson | Published: 2019-03-18
Signal Processing Techniques
Adversarial Attack Methods
Speech Synthesis Technology

A Research Agenda: Dynamic Models to Defend Against Correlated Attacks

Authors: Ian Goodfellow | Published: 2019-03-14
Certified Robustness
Dynamic Service Scheduling
Adversarial Attack Methods

Attribution-driven Causal Analysis for Detection of Adversarial Examples

Authors: Susmit Jha, Sunny Raj, Steven Lawrence Fernandes, Sumit Kumar Jha, Somesh Jha, Gunjan Verma, Brian Jalaian, Ananthram Swami | Published: 2019-03-14
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents

Authors: Panagiota Kiourti, Kacper Wardega, Susmit Jha, Wenchao Li | Published: 2019-03-01
Poisoning
Reinforcement Learning
Adversarial Attack Methods

Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment

Authors: Ziqi Yang, Ee-Chien Chang, Zhenkai Liang | Published: 2019-02-22
Model Inversion
Adversarial Attack Methods
Optimization Methods

Adversarial Attacks on Graph Neural Networks via Meta Learning

Authors: Daniel Zügner, Stephan Günnemann | Published: 2019-02-22 | Updated: 2024-01-28
Graph Construction
Adversarial Example
Adversarial Attack Methods

Quantifying Perceptual Distortion of Adversarial Examples

Authors: Matt Jordan, Naren Manoj, Surbhi Goel, Alexandros G. Dimakis | Published: 2019-02-21
Certified Robustness
Adversarial Learning
Adversarial Attack Methods