Adversarial Attack Detection

Scaling up the randomized gradient-free adversarial attack reveals overestimation of robustness using established attacks

Authors: Francesco Croce, Jonas Rauber, Matthias Hein | Published: 2019-03-27 | Updated: 2019-09-25
Trigger Detection
Adversarial Learning
Adversarial Attack Detection

A geometry-inspired decision-based attack

Authors: Yujia Liu, Seyed-Mohsen Moosavi-Dezfooli, Pascal Frossard | Published: 2019-03-26
Certified Robustness
Effective Perturbation Methods
Adversarial Attack Detection

Defending against Whitebox Adversarial Attacks via Randomized Discretization

Authors: Yuchen Zhang, Percy Liang | Published: 2019-03-25
Certified Robustness
Effective Perturbation Methods
Adversarial Attack Detection

Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness

Authors: Jörn-Henrik Jacobsen, Jens Behrmannn, Nicholas Carlini, Florian Tramèr, Nicolas Papernot | Published: 2019-03-25
Certified Robustness
Vulnerability of Adversarial Examples
Adversarial Attack Detection

Robust Neural Networks using Randomized Adversarial Training

Authors: Alexandre Araujo, Laurent Meunier, Rafael Pinot, Benjamin Negrevergne | Published: 2019-03-25 | Updated: 2020-02-13
Certified Robustness
Adversarial Learning
Adversarial Attack Detection

Data Poisoning against Differentially-Private Learners: Attacks and Defenses

Authors: Yuzhe Ma, Xiaojin Zhu, Justin Hsu | Published: 2019-03-23 | Updated: 2019-07-05
Detection of Poison Data for Backdoor Attacks
Adversarial Attack Detection
Untargeted Toxicity Attack

Improving Adversarial Robustness via Guided Complement Entropy

Authors: Hao-Yun Chen, Jhao-Hong Liang, Shih-Chieh Chang, Jia-Yu Pan, Yu-Ting Chen, Wei Wei, Da-Cheng Juan | Published: 2019-03-23 | Updated: 2019-08-07
Robust Optimization
Adversarial Learning
Adversarial Attack Detection

On the Robustness of Deep K-Nearest Neighbors

Authors: Chawin Sitawarin, David Wagner | Published: 2019-03-20
Certified Robustness
Effective Perturbation Methods
Adversarial Attack Detection

Clonability of anti-counterfeiting printable graphical codes: a machine learning approach

Authors: Olga Taran, Slavi Bonev, Slava Voloshynovskiy | Published: 2019-03-18
Performance Evaluation
Adversarial Attack Detection
Deep Learning Model

Generating Adversarial Examples With Conditional Generative Adversarial Net

Authors: Ping Yu, Kaitao Song, Jianfeng Lu | Published: 2019-03-18
Certified Robustness
Adversarial Example
Adversarial Attack Detection