Adversarial Attack Detection

SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection

Authors: Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun | Published: 2020-06-02 | Updated: 2020-08-30
Algorithm
Energy Management
Adversarial Attack Detection

Perturbation Analysis of Gradient-based Adversarial Attacks

Authors: Utku Ozbulak, Manvel Gasparyan, Wesley De Neve, Arnout Van Messem | Published: 2020-06-02
Poisoning
Attack Type
Adversarial Attack Detection

Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods

Authors: Kyungmi Lee, Anantha P. Chandrakasan | Published: 2020-06-01
Poisoning
Adversarial Attack Detection
Defense Effectiveness Analysis

Adversarial Attacks on Reinforcement Learning based Energy Management Systems of Extended Range Electric Delivery Vehicles

Authors: Pengyue Wang, Yan Li, Shashi Shekhar, William F. Northrop | Published: 2020-06-01
Energy Management
Adversarial Attack Detection
Deep Reinforcement Learning

Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder

Authors: Guanlin Li, Shuya Ding, Jun Luo, Chang Liu | Published: 2020-05-06
Algorithm
Robustness Improvement Method
Adversarial Attack Detection

Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability

Authors: Nathan Inkawhich, Kevin J Liang, Binghui Wang, Matthew Inkawhich, Lawrence Carin, Yiran Chen | Published: 2020-04-29
Algorithm
Adversarial Attack Detection
Role of Machine Learning

Minority Reports Defense: Defending Against Adversarial Patches

Authors: Michael McCoyd, Won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang, Jason Xinyu Liu, David Wagner | Published: 2020-04-28
Attack Detection
Adversarial Attack Detection
Defense Effectiveness Analysis

Adversarial Learning Guarantees for Linear Hypotheses and Neural Networks

Authors: Pranjal Awasthi, Natalie Frank, Mehryar Mohri | Published: 2020-04-28
Robustness Improvement Method
Formal Verification
Adversarial Attack Detection

Variational Encoder-based Reliable Classification

Authors: Chitresh Bhushan, Zhaoyuan Yang, Nurali Virani, Naresh Iyer | Published: 2020-02-19 | Updated: 2020-10-17
Training Method
Robustness Evaluation
Adversarial Attack Detection

Indirect Adversarial Attacks via Poisoning Neighbors for Graph Convolutional Networks

Authors: Tsubasa Takahashi | Published: 2020-02-19
Graph Neural Network
Adversarial Example
Adversarial Attack Detection