Adversarial Attack Methods

Adversarial Reinforcement Learning for Observer Design in Autonomous Systems under Cyber Attacks

Authors: Abhishek Gupta, Zhaoyuan Yang | Published: 2018-09-15
Online Learning
Robustness Improvement Method
Adversarial Attack Methods

Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers

Authors: Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach | Published: 2018-04-23 | Updated: 2020-10-03
Query Generation Method
Certified Robustness
Adversarial Attack Methods

Black-box Adversarial Attacks with Limited Queries and Information

Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin | Published: 2018-04-23 | Updated: 2018-07-11
Model Extraction Attack
Adversarial Example
Adversarial Attack Methods

Gradient Masking Causes CLEVER to Overestimate Adversarial Perturbation Size

Authors: Ian Goodfellow | Published: 2018-04-21
Adversarial Learning
Adversarial Attack Methods
Watermarking Technology

ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector

Authors: Shang-Tse Chen, Cory Cornelius, Jason Martin, Duen Horng Chau | Published: 2018-04-16 | Updated: 2019-05-01
Faster R-CNN
Certified Robustness
Adversarial Attack Methods

On the Limitation of MagNet Defense against $L_1$-based Adversarial Examples

Authors: Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu | Published: 2018-04-14 | Updated: 2018-05-09
Adversarial Example Detection
Adversarial Attack Methods
Watermarking Technology

Detecting Adversarial Examples – A Lesson from Multimedia Forensics

Authors: Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme | Published: 2018-03-09
Adversarial Example
Adversarial Example Detection
Adversarial Attack Methods

Adversarial Perturbation Intensity Achieving Chosen Intra-Technique Transferability Level for Logistic Regression

Authors: Martin Gubri | Published: 2018-01-06
Certified Robustness
Adversarial Attack Methods
Machine Learning Algorithm

Did you hear that? Adversarial Examples Against Automatic Speech Recognition

Authors: Moustafa Alzantot, Bharathan Balaji, Mani Srivastava | Published: 2018-01-02
Adversarial Attack Methods
Machine Learning Algorithm
Speech Enhancement Technology

Building Robust Deep Neural Networks for Road Sign Detection

Authors: Arkar Min Aung, Yousef Fadila, Radian Gondokaryono, Luis Gonzalez | Published: 2017-12-26
Robustness Improvement Method
Adversarial Example
Adversarial Attack Methods