Adversarial Attack Methods

Adversarial Examples in RF Deep Learning: Detection of the Attack and its Physical Robustness

Authors: Silvija Kokalj-Filipovic, Rob Miller | Published: 2019-02-16
Adversarial Example
Adversarial attack
Adversarial Attack Methods

Can Intelligent Hyperparameter Selection Improve Resistance to Adversarial Examples?

Authors: Cody Burkard, Brent Lagesse | Published: 2019-02-14
Adversarial Example
Adversarial Example Detection
Adversarial Attack Methods

The Odds are Odd: A Statistical Test for Detecting Adversarial Examples

Authors: Kevin Roth, Yannic Kilcher, Thomas Hofmann | Published: 2019-02-13 | Updated: 2019-05-09
Certified Robustness
Adversarial attack
Adversarial Attack Methods

Adversarial Samples on Android Malware Detection Systems for IoT Systems

Authors: Xiaolei Liu, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Mohsen Guizani | Published: 2019-02-12
Malware Detection Method
Adversarial Attack Methods
Optimization Strategy

Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis

Authors: Danilo Vasconcellos Vargas, Jiawei Su | Published: 2019-02-08
Certified Robustness
Adversarial Attack Methods
Image Classification Interpretation

ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System

Authors: Huangxun Chen, Chenyu Huang, Qianyi Huang, Qian Zhang, Wei Wang | Published: 2019-01-12 | Updated: 2020-01-14
Trigger Detection
Model Evaluation
Adversarial Attack Methods

Exploring Adversarial Examples in Malware Detection

Authors: Octavian Suciu, Scott E. Coull, Jeffrey Johns | Published: 2018-10-18 | Updated: 2019-04-13
Poisoning
Adversarial Example
Adversarial Attack Methods

A Training-based Identification Approach to VIN Adversarial Examples

Authors: Yingdi Wang, Wenjia Niu, Tong Chen, Yingxiao Xiang, Jingjing Liu, Gang Li, Jiqiang Liu | Published: 2018-10-18
Robustness Improvement Method
Adversarial Example Detection
Adversarial Attack Methods

Security Matters: A Survey on Adversarial Machine Learning

Authors: Guofu Li, Pengjia Zhu, Jin Li, Zhemin Yang, Ning Cao, Zhiyi Chen | Published: 2018-10-16 | Updated: 2018-10-23
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

The Adversarial Attack and Detection under the Fisher Information Metric

Authors: Chenxiao Zhao, P. Thomas Fletcher, Mixue Yu, Yaxin Peng, Guixu Zhang, Chaomin Shen | Published: 2018-10-09 | Updated: 2019-02-09
Certified Robustness
Adversarial Learning
Adversarial Attack Methods