Adversarial Attack Detection

Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review

Authors: Huda Ali Alatwi, Charles Morisset | Published: 2021-12-06
Poisoning
Adversarial Example
Adversarial Attack Detection

Availability Attacks Create Shortcuts

Authors: Da Yu, Huishuai Zhang, Wei Chen, Jian Yin, Tie-Yan Liu | Published: 2021-11-01 | Updated: 2022-06-02
DDoS Attack
Data Generation
Adversarial Attack Detection

Detecting and Identifying Optical Signal Attacks on Autonomous Driving Systems

Authors: Jindi Zhang, Yifan Zhang, Kejie Lu, Jianping Wang, Kui Wu, Xiaohua Jia, Bin Liu | Published: 2021-10-20
Sensor State Estimation
Adversarial Attack Detection
Automotive Network Security

Adversarial Examples Detection with Bayesian Neural Network

Authors: Yao Li, Tongyi Tang, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-05-18 | Updated: 2024-02-23
Performance Evaluation
Adversarial Example
Adversarial Attack Detection

Real-time Detection of Practical Universal Adversarial Perturbations

Authors: Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Emil C. Lupu | Published: 2021-05-16 | Updated: 2021-05-22
UAP Training Method
Adversarial Attack Detection
Defense Mechanism

Adversarial Concept Drift Detection under Poisoning Attacks for Robust Data Stream Mining

Authors: Łukasz Korycki, Bartosz Krawczyk | Published: 2020-09-20
Drift Detection Method
Poisoning
Adversarial Attack Detection

Robust Deep Learning Ensemble against Deception

Authors: Wenqi Wei, Ling Liu | Published: 2020-09-14
Adversarial Example
Adversarial Attack Detection
Adversarial Training

Adversary Agnostic Robust Deep Reinforcement Learning

Authors: Xinghua Qu, Yew-Soon Ong, Abhishek Gupta, Zhu Sun | Published: 2020-08-14 | Updated: 2020-12-24
Policy engineering
Adversarial Attack Detection
Machine Learning Method

Trace-Norm Adversarial Examples

Authors: Ehsan Kazemi, Thomas Kerdreux, Liqiang Wang | Published: 2020-07-02
Algorithm Design
Adversarial Attack Detection
Defense Mechanism

Defensive Approximation: Securing CNNs using Approximate Computing

Authors: Amira Guesmi, Ihsen Alouani, Khaled Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael Abu-Ghazaleh | Published: 2020-06-13 | Updated: 2021-07-29
Adversarial Example
Adversarial Attack Detection
Approximate Calculation