Adversarial Attack Detection

RX-ADS: Interpretable Anomaly Detection using Adversarial ML for Electric Vehicle CAN data

Authors: Chathurika S. Wickramasinghe, Daniel L. Marino, Harindra S. Mavikumbure, Victor Cobilean, Timothy D. Pennington, Benny J. Varghese, Craig Rieger, Milos Manic | Published: 2022-09-05
Model Design
Intrusion Detection System
Adversarial Attack Detection

A Deep Learning Approach to Create DNS Amplification Attacks

Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance | Published: 2022-06-29
Algorithm Design
Backdoor Attack
Adversarial Attack Detection

Adversarial Robustness is at Odds with Lazy Training

Authors: Yunjuan Wang, Enayat Ullah, Poorya Mianjy, Raman Arora | Published: 2022-06-18 | Updated: 2022-10-17
Algorithm Design
Adversarial Example
Adversarial Attack Detection

Holistic Adversarial Robustness of Deep Learning Models

Authors: Pin-Yu Chen, Sijia Liu | Published: 2022-02-15 | Updated: 2023-01-05
Poisoning
Adversarial Attack Detection
Defense Method

Pixle: a fast and effective black-box attack based on rearranging pixels

Authors: Jary Pomponi, Simone Scardapane, Aurelio Uncini | Published: 2022-02-04
Adversarial Attack Detection
Vulnerability Attack Method
Defense Method

Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review

Authors: Huda Ali Alatwi, Charles Morisset | Published: 2021-12-06
Poisoning
Adversarial Example
Adversarial Attack Detection

Availability Attacks Create Shortcuts

Authors: Da Yu, Huishuai Zhang, Wei Chen, Jian Yin, Tie-Yan Liu | Published: 2021-11-01 | Updated: 2022-06-02
DDoS Attack
Data Generation
Adversarial Attack Detection

Detecting and Identifying Optical Signal Attacks on Autonomous Driving Systems

Authors: Jindi Zhang, Yifan Zhang, Kejie Lu, Jianping Wang, Kui Wu, Xiaohua Jia, Bin Liu | Published: 2021-10-20
Sensor State Estimation
Adversarial Attack Detection
Automotive Network Security

Adversarial Examples Detection with Bayesian Neural Network

Authors: Yao Li, Tongyi Tang, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-05-18 | Updated: 2024-02-23
Performance Evaluation
Adversarial Example
Adversarial Attack Detection

Real-time Detection of Practical Universal Adversarial Perturbations

Authors: Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Emil C. Lupu | Published: 2021-05-16 | Updated: 2021-05-22
UAP Training Method
Adversarial Attack Detection
Defense Mechanism