Adversarial Attack Detection

HRFA: High-Resolution Feature-based Attack

Authors: Zhixing Ye, Sizhe Chen, Peidong Zhang, Chengjin Sun, Xiaolin Huang | Published: 2020-01-21 | Updated: 2020-10-22
Adversarial Example
Adversarial Attack Detection
Generative Adversarial Network

Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet

Authors: Sizhe Chen, Zhengbao He, Chengjin Sun, Jie Yang, Xiaolin Huang | Published: 2020-01-16 | Updated: 2020-10-21
Adversarial Learning
Adversarial Attack Detection
Research Methodology

Square Attack: a query-efficient black-box adversarial attack via random search

Authors: Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion, Matthias Hein | Published: 2019-11-29 | Updated: 2020-07-29
Model Evaluation
Adversarial Attack Detection
Adversarial Training

A New Defense Against Adversarial Images: Turning a Weakness into a Strength

Authors: Tao Yu, Shengyuan Hu, Chuan Guo, Wei-Lun Chao, Kilian Q. Weinberger | Published: 2019-10-16 | Updated: 2019-12-04
Model Robustness
Adversarial Learning
Adversarial Attack Detection

Universal, transferable and targeted adversarial attacks

Authors: Junde Wu, Rao Fu | Published: 2019-08-29 | Updated: 2022-06-13
Poisoning
Adversarial Example
Adversarial Attack Detection

Detection of Backdoors in Trained Classifiers Without Access to the Training Set

Authors: Zhen Xiang, David J. Miller, George Kesidis | Published: 2019-08-27 | Updated: 2020-08-19
Backdoor Attack
Attack Type
Adversarial Attack Detection

Adversarial Edit Attacks for Tree Data

Authors: Benjamin Paaßen | Published: 2019-08-25 | Updated: 2019-08-27
Adversarial Example
Adversarial Attack Detection
Machine Learning Application

Characterizing Attacks on Deep Reinforcement Learning

Authors: Xinlei Pan, Chaowei Xiao, Warren He, Shuang Yang, Jian Peng, Mingjie Sun, Jinfeng Yi, Zijiang Yang, Mingyan Liu, Bo Li, Dawn Song | Published: 2019-07-21 | Updated: 2022-02-16
Adversarial Attack Detection
Deep Reinforcement Learning
Physical attack

Trust but Verify: An Information-Theoretic Explanation for the Adversarial Fragility of Machine Learning Systems, and a General Defense against Adversarial Attacks

Authors: Jirong Yi, Hui Xie, Leixin Zhou, Xiaodong Wu, Weiyu Xu, Raghuraman Mudumbai | Published: 2019-05-25
Adversarial Example
Adversarial Attack Detection
Speech Signal Processing

On the Connection Between Adversarial Robustness and Saliency Map Interpretability

Authors: Christian Etmann, Sebastian Lunz, Peter Maass, Carola-Bibiane Schönlieb | Published: 2019-05-10
Robust Estimation
Adversarial Attack Detection
loss of Interpretability