Adversarial Attack Methods

Detecting Adversarial Examples – A Lesson from Multimedia Forensics

Authors: Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme | Published: 2018-03-09
Adversarial Example
Adversarial Example Detection
Adversarial Attack Methods

Adversarial Perturbation Intensity Achieving Chosen Intra-Technique Transferability Level for Logistic Regression

Authors: Martin Gubri | Published: 2018-01-06
Certified Robustness
Adversarial Attack Methods
Machine Learning Algorithm

Did you hear that? Adversarial Examples Against Automatic Speech Recognition

Authors: Moustafa Alzantot, Bharathan Balaji, Mani Srivastava | Published: 2018-01-02
Adversarial Attack Methods
Machine Learning Algorithm
Speech Enhancement Technology

Building Robust Deep Neural Networks for Road Sign Detection

Authors: Arkar Min Aung, Yousef Fadila, Radian Gondokaryono, Luis Gonzalez | Published: 2017-12-26
Robustness Improvement Method
Adversarial Example
Adversarial Attack Methods

Query-limited Black-box Attacks to Classifiers

Authors: Fnu Suya, Yuan Tian, David Evans, Paolo Papotti | Published: 2017-12-23
Query Generation Method
Adversarial Attack Methods
Machine Learning Algorithm

Query-Efficient Black-box Adversarial Examples (superceded)

Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin | Published: 2017-12-19 | Updated: 2018-04-06
Poisoning
Adversarial Learning
Adversarial Attack Methods

When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time

Authors: David J. Miller, Yulia Wang, George Kesidis | Published: 2017-12-18 | Updated: 2018-06-28
Trigger Detection
Adversarial Example
Adversarial Attack Methods

Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models

Authors: Wieland Brendel, Jonas Rauber, Matthias Bethge | Published: 2017-12-12 | Updated: 2018-02-16
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning

Authors: Battista Biggio, Fabio Roli | Published: 2017-12-08 | Updated: 2018-07-19
Poisoning
Adversarial Learning
Adversarial Attack Methods

Generative Adversarial Perturbations

Authors: Omid Poursaeed, Isay Katsman, Bicheng Gao, Serge Belongie | Published: 2017-12-06 | Updated: 2018-07-06
Certified Robustness
Adversarial Attack Methods
Generative Adversarial Network