Adversarial Attack Detection

Practical Fast Gradient Sign Attack against Mammographic Image Classifier

Authors: Ibrahim Yilmaz | Published: 2020-01-27
Adversarial Learning
Adversarial Attack Detection
Machine Learning Method

Ensemble Noise Simulation to Handle Uncertainty about Gradient-based Adversarial Attacks

Authors: Rehana Mahfuz, Rajeev Sahay, Aly El Gamal | Published: 2020-01-26
Adversarial Learning
Adversarial Attack Detection
Effectiveness Analysis of Defense Methods

On the human evaluation of audio adversarial examples

Authors: Jon Vadillo, Roberto Santana | Published: 2020-01-23 | Updated: 2021-02-12
Adversarial Example
Adversarial Attack Detection
Malfunction of Voice Assistants

Adversarial Attack on Community Detection by Hiding Individuals

Authors: Jia Li, Honglei Zhang, Zhichao Han, Yu Rong, Hong Cheng, Junzhou Huang | Published: 2020-01-22
Community Detection
Poisoning
Adversarial Attack Detection

Massif: Interactive Interpretation of Adversarial Attacks on Deep Learning

Authors: Nilaksh Das, Haekyu Park, Zijie J. Wang, Fred Hohman, Robert Firstman, Emily Rogers, Duen Horng Chau | Published: 2020-01-21 | Updated: 2020-02-16
Adversarial Attack Detection
Deep Reinforcement Learning

HRFA: High-Resolution Feature-based Attack

Authors: Zhixing Ye, Sizhe Chen, Peidong Zhang, Chengjin Sun, Xiaolin Huang | Published: 2020-01-21 | Updated: 2020-10-22
Adversarial Example
Adversarial Attack Detection
Generative Adversarial Network

Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet

Authors: Sizhe Chen, Zhengbao He, Chengjin Sun, Jie Yang, Xiaolin Huang | Published: 2020-01-16 | Updated: 2020-10-21
Adversarial Learning
Adversarial Attack Detection
Research Methodology

Square Attack: a query-efficient black-box adversarial attack via random search

Authors: Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion, Matthias Hein | Published: 2019-11-29 | Updated: 2020-07-29
Model Evaluation
Adversarial Attack Detection
Adversarial Training

A New Defense Against Adversarial Images: Turning a Weakness into a Strength

Authors: Tao Yu, Shengyuan Hu, Chuan Guo, Wei-Lun Chao, Kilian Q. Weinberger | Published: 2019-10-16 | Updated: 2019-12-04
Model Robustness
Adversarial Learning
Adversarial Attack Detection

Universal, transferable and targeted adversarial attacks

Authors: Junde Wu, Rao Fu | Published: 2019-08-29 | Updated: 2022-06-13
Poisoning
Adversarial Example
Adversarial Attack Detection