Adversarial Attack Methods

Optimizing Information Loss Towards Robust Neural Networks

Authors: Philip Sperl, Konstantin Böttinger | Published: 2020-08-07 | Updated: 2020-09-29
Information-Theoretic Approach
Adversarial Example
Adversarial Attack Methods

Deep Learning Defenses Against Adversarial Examples for Dynamic Risk Assessment

Authors: Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, Ines Goicoechea-Telleria, Raul Orduna-Urrutia | Published: 2020-07-02
Adversarial Example
Adversarial Attack Methods
Defense Mechanism

Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks

Authors: Francesco Croce, Maksym Andriushchenko, Naman D. Singh, Nicolas Flammarion, Matthias Hein | Published: 2020-06-23 | Updated: 2022-02-08
Query Generation Method
Reinforcement Learning
Adversarial Attack Methods

RayS: A Ray Searching Method for Hard-label Adversarial Attack

Authors: Jinghui Chen, Quanquan Gu | Published: 2020-06-23 | Updated: 2020-09-05
Membership Inference
Adversarial Attack Methods
Machine Learning Algorithm

Perceptual Adversarial Robustness: Defense Against Unseen Threat Models

Authors: Cassidy Laidlaw, Sahil Singla, Soheil Feizi | Published: 2020-06-22 | Updated: 2021-07-04
Poisoning
Adversarial Attack Methods
Defense Mechanism

Learning to Generate Noise for Multi-Attack Robustness

Authors: Divyam Madaan, Jinwoo Shin, Sung Ju Hwang | Published: 2020-06-22 | Updated: 2021-06-24
Adversarial Perturbation Techniques
Adversarial Attack Methods
Defense Mechanism

OGAN: Disrupting Deepfakes with an Adversarial Attack that Survives Training

Authors: Eran Segalis, Eran Galili | Published: 2020-06-17 | Updated: 2020-11-25
Adversarial Attack Methods
Machine Learning Algorithm
Image Processing

QEBA: Query-Efficient Boundary-Based Blackbox Attack

Authors: Huichen Li, Xiaojun Xu, Xiaolu Zhang, Shuang Yang, Bo Li | Published: 2020-05-28
Adversarial Attack Methods
Privacy Protection in Machine Learning
Dimensionality Reduction Method

Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms

Authors: Mohsen Minaei, S Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate | Published: 2020-05-28
Data Protection Method
Privacy Assessment
Adversarial Attack Methods

Transferable Perturbations of Deep Feature Distributions

Authors: Nathan Inkawhich, Kevin J Liang, Lawrence Carin, Yiran Chen | Published: 2020-04-27
Multi-Class Classification
Adversarial Attack Methods
Deep Learning Technology