Adversarial Attack Detection

Detection of Backdoors in Trained Classifiers Without Access to the Training Set

Authors: Zhen Xiang, David J. Miller, George Kesidis | Published: 2019-08-27 | Updated: 2020-08-19
Backdoor Attack
Attack Type
Adversarial Attack Detection

Adversarial Edit Attacks for Tree Data

Authors: Benjamin Paaßen | Published: 2019-08-25 | Updated: 2019-08-27
Adversarial Example
Adversarial Attack Detection
Machine Learning Application

Characterizing Attacks on Deep Reinforcement Learning

Authors: Xinlei Pan, Chaowei Xiao, Warren He, Shuang Yang, Jian Peng, Mingjie Sun, Jinfeng Yi, Zijiang Yang, Mingyan Liu, Bo Li, Dawn Song | Published: 2019-07-21 | Updated: 2022-02-16
Adversarial Attack Detection
Deep Reinforcement Learning
Physical attack

Trust but Verify: An Information-Theoretic Explanation for the Adversarial Fragility of Machine Learning Systems, and a General Defense against Adversarial Attacks

Authors: Jirong Yi, Hui Xie, Leixin Zhou, Xiaodong Wu, Weiyu Xu, Raghuraman Mudumbai | Published: 2019-05-25
Adversarial Example
Adversarial Attack Detection
Speech Signal Processing

On the Connection Between Adversarial Robustness and Saliency Map Interpretability

Authors: Christian Etmann, Sebastian Lunz, Peter Maass, Carola-Bibiane Schönlieb | Published: 2019-05-10
Robust Estimation
Adversarial Attack Detection
loss of Interpretability

Adversarial Image Translation: Unrestricted Adversarial Examples in Face Recognition Systems

Authors: Kazuya Kakizaki, Kosuke Yoshida | Published: 2019-05-09 | Updated: 2020-01-28
Factors of Performance Degradation
Adversarial Example
Adversarial Attack Detection

Adaptive Generation of Unrestricted Adversarial Inputs

Authors: Isaac Dunn, Hadrien Pouget, Tom Melham, Daniel Kroening | Published: 2019-05-07 | Updated: 2019-10-01
Adversarial Example
Adversarial Attack Detection
Adaptive Adversarial Training

Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples

Authors: Vikash Sehwag, Arjun Nitin Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, Prateek Mittal | Published: 2019-05-05
Poisoning
Adversarial Example
Adversarial Attack Detection

CharBot: A Simple and Effective Method for Evading DGA Classifiers

Authors: Jonathan Peck, Claire Nie, Raaghavi Sivaguru, Charles Grumer, Femi Olumofin, Bin Yu, Anderson Nascimento, Martine De Cock | Published: 2019-05-03 | Updated: 2019-05-30
Malware Detection
Adversarial Attack Detection
Machine Learning

Transfer of Adversarial Robustness Between Perturbation Types

Authors: Daniel Kang, Yi Sun, Tom Brown, Dan Hendrycks, Jacob Steinhardt | Published: 2019-05-03
Adversarial Example
Adversarial Attack Detection
Adaptive Adversarial Training