Adversarial Attack Methods

OGAN: Disrupting Deepfakes with an Adversarial Attack that Survives Training

Authors: Eran Segalis, Eran Galili | Published: 2020-06-17 | Updated: 2020-11-25
Adversarial Attack Methods
Machine Learning Algorithm
Image Processing

QEBA: Query-Efficient Boundary-Based Blackbox Attack

Authors: Huichen Li, Xiaojun Xu, Xiaolu Zhang, Shuang Yang, Bo Li | Published: 2020-05-28
Adversarial Attack Methods
Privacy Protection in Machine Learning
Dimensionality Reduction Method

Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms

Authors: Mohsen Minaei, S Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate | Published: 2020-05-28
Data Protection Method
Privacy Assessment
Adversarial Attack Methods

Transferable Perturbations of Deep Feature Distributions

Authors: Nathan Inkawhich, Kevin J Liang, Lawrence Carin, Yiran Chen | Published: 2020-04-27
Multi-Class Classification
Adversarial Attack Methods
Deep Learning Technology

Improved Image Wasserstein Attacks and Defenses

Authors: Edward J. Hu, Adith Swaminathan, Hadi Salman, Greg Yang | Published: 2020-04-26 | Updated: 2023-05-09
Robustness Analysis
Adversarial Example
Adversarial Attack Methods

A Black-box Adversarial Attack Strategy with Adjustable Sparsity and Generalizability for Deep Image Classifiers

Authors: Arka Ghosh, Sankha Subhra Mullick, Shounak Datta, Swagatam Das, Rammohan Mallipeddi, Asit Kr. Das | Published: 2020-04-24 | Updated: 2021-09-09
Poisoning
Adversarial Attack Methods
Optimization Problem

Adversarial Attacks and Defenses: An Interpretation Perspective

Authors: Ninghao Liu, Mengnan Du, Ruocheng Guo, Huan Liu, Xia Hu | Published: 2020-04-23 | Updated: 2020-10-07
Poisoning
Adversarial Example
Adversarial Attack Methods

Adversarial Machine Learning in Network Intrusion Detection Systems

Authors: Elie Alhajjar, Paul Maxwell, Nathaniel D. Bastian | Published: 2020-04-23
Adversarial Example
Adversarial Attack Methods
Machine Learning

Domain Adaptive Transfer Attack (DATA)-based Segmentation Networks for Building Extraction from Aerial Images

Authors: Younghwan Na, Jun Hee Kim, Kyungsu Lee, Juhum Park, Jae Youn Hwang, Jihwan P. Choi | Published: 2020-04-11 | Updated: 2020-04-29
Semantic Information Extraction
Generalization Performance
Adversarial Attack Methods

A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks

Authors: Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta | Published: 2020-03-26 | Updated: 2021-12-13
Poisoning
Adversarial Attack Methods
Vulnerability Attack Method