Adversarial Attack Detection

Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability

Authors: Nathan Inkawhich, Kevin J Liang, Binghui Wang, Matthew Inkawhich, Lawrence Carin, Yiran Chen | Published: 2020-04-29
Algorithm
Adversarial Attack Detection
Role of Machine Learning

Minority Reports Defense: Defending Against Adversarial Patches

Authors: Michael McCoyd, Won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang, Jason Xinyu Liu, David Wagner | Published: 2020-04-28
Attack Detection
Adversarial Attack Detection
Defense Effectiveness Analysis

Adversarial Learning Guarantees for Linear Hypotheses and Neural Networks

Authors: Pranjal Awasthi, Natalie Frank, Mehryar Mohri | Published: 2020-04-28
Robustness Improvement Method
Formal Verification
Adversarial Attack Detection

Variational Encoder-based Reliable Classification

Authors: Chitresh Bhushan, Zhaoyuan Yang, Nurali Virani, Naresh Iyer | Published: 2020-02-19 | Updated: 2020-10-17
Training Method
Robustness Evaluation
Adversarial Attack Detection

Indirect Adversarial Attacks via Poisoning Neighbors for Graph Convolutional Networks

Authors: Tsubasa Takahashi | Published: 2020-02-19
Graph Neural Network
Adversarial Example
Adversarial Attack Detection

Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent

Authors: Pu Zhao, Pin-Yu Chen, Siyue Wang, Xue Lin | Published: 2020-02-18
Factors of Performance Degradation
Adversarial Attack Detection
Computational Efficiency

Deflecting Adversarial Attacks

Authors: Yao Qin, Nicholas Frosst, Colin Raffel, Garrison Cottrell, Geoffrey Hinton | Published: 2020-02-18
Poisoning
Adversarial Attack Detection
Defense Method

On the Matrix-Free Generation of Adversarial Perturbations for Black-Box Attacks

Authors: Hisaichi Shibata, Shouhei Hanaoka, Yukihiro Nomura, Naoto Hayashi, Osamu Abe | Published: 2020-02-18
Adversarial Example
Adversarial Attack Detection
Computational Efficiency

Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets

Authors: Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey, Xingjun Ma | Published: 2020-02-14
Poisoning
Adversarial Attack Detection
Defense Method

Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning

Authors: Inaam Ilahi, Muhammad Usama, Junaid Qadir, Muhammad Umar Janjua, Ala Al-Fuqaha, Dinh Thai Hoang, Dusit Niyato | Published: 2020-01-27 | Updated: 2021-09-08
Adversarial Attack Detection
Fundamentals of Machine Learning
Deep Reinforcement Learning