Adversarial Attack Detection

Defensive Quantization: When Efficiency Meets Robustness

Authors: Ji Lin, Chuang Gan, Song Han | Published: 2019-04-17
Adversarial Learning
Adversarial Attack Detection
Quantized Neural Network

Adversarial Defense Through Network Profiling Based Path Extraction

Authors: Yuxian Qiu, Jingwen Leng, Cong Guo, Quan Chen, Chao Li, Minyi Guo, Yuhao Zhu | Published: 2019-04-17 | Updated: 2019-05-09
Model Performance Evaluation
Adversarial Attack Detection
Deep Learning

Are Self-Driving Cars Secure? Evasion Attacks against Deep Neural Networks for Steering Angle Prediction

Authors: Alesia Chernikova, Alina Oprea, Cristina Nita-Rotaru, BaekGyu Kim | Published: 2019-04-15
Adversarial Learning
Adversarial Attack Detection
Deep Learning

Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks

Authors: David J. Miller, Zhen Xiang, George Kesidis | Published: 2019-04-12 | Updated: 2019-12-02
Backdoor Attack
Poisoning
Adversarial Attack Detection

Malware Evasion Attack and Defense

Authors: Yonghong Huang, Utkarsh Verma, Celeste Fralick, Gabriel Infante-Lopez, Brajesh Kumarz, Carl Woodward | Published: 2019-04-07 | Updated: 2019-04-16
Malware Detection
Adversarial Example
Adversarial Attack Detection

Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning

Authors: Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang | Published: 2019-04-01 | Updated: 2019-11-30
Model Extraction Attack
Reconstruction Attack
Adversarial Attack Detection

Defending against adversarial attacks by randomized diversification

Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-04-01
Adversarial Example Detection
Adversarial Attack Detection
Watermark Robustness

On the Vulnerability of CNN Classifiers in EEG-Based BCIs

Authors: Xiao Zhang, Dongrui Wu | Published: 2019-03-31
Certified Robustness
Adversarial Learning
Adversarial Attack Detection

Benchmarking Neural Network Robustness to Common Corruptions and Perturbations

Authors: Dan Hendrycks, Thomas Dietterich | Published: 2019-03-28
Robust Optimization
Adversarial Learning
Adversarial Attack Detection

Rallying Adversarial Techniques against Deep Learning for Network Security

Authors: Joseph Clements, Yuzhe Yang, Ankur Sharma, Hongxin Hu, Yingjie Lao | Published: 2019-03-27 | Updated: 2021-10-25
Effective Perturbation Methods
Adversarial Learning
Adversarial Attack Detection