Adversarial attack

Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack

Authors: Rui Shu, Tianpei Xia, Laurie Williams, Tim Menzies | Published: 2020-11-23 | Updated: 2021-10-12
Model Performance Evaluation
Adversarial Example
Adversarial attack

Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams

Authors: Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David Wagner | Published: 2020-11-19 | Updated: 2021-11-01
Performance Evaluation
Adversarial attack
Selection and Evaluation of Optimization Algorithms

Adversarially Robust Classification based on GLRT

Authors: Bhagyashree Puranik, Upamanyu Madhow, Ramtin Pedarsani | Published: 2020-11-16
Watermarking
Performance Evaluation
Adversarial attack

Almost Tight L0-norm Certified Robustness of Top-k Predictions against Adversarial Perturbations

Authors: Jinyuan Jia, Binghui Wang, Xiaoyu Cao, Hongbin Liu, Neil Zhenqiang Gong | Published: 2020-11-15 | Updated: 2022-06-03
Model Performance Evaluation
Stability of Predictions
Adversarial attack

Efficient and Transferable Adversarial Examples from Bayesian Neural Networks

Authors: Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen | Published: 2020-11-10 | Updated: 2022-06-18
Model Performance Evaluation
Adversarial Example
Adversarial attack

Blockchain based Attack Detection on Machine Learning Algorithms for IoT based E-Health Applications

Authors: Thippa Reddy Gadekallu, Manoj M K, Sivarama Krishnan S, Neeraj Kumar, Saqib Hakak, Sweta Bhattacharya | Published: 2020-11-03 | Updated: 2021-10-02
Blockchain Technology
Attack Type
Adversarial attack

Adversarial Examples in Constrained Domains

Authors: Ryan Sheatsley, Nicolas Papernot, Michael Weisman, Gunjan Verma, Patrick McDaniel | Published: 2020-11-02 | Updated: 2022-09-09
Adversarial Example
Adversarial attack
Feature Engineering

Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples

Authors: Sven Gowal, Chongli Qin, Jonathan Uesato, Timothy Mann, Pushmeet Kohli | Published: 2020-10-07 | Updated: 2021-03-30
Poisoning
Robustness Improvement Method
Adversarial attack

Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples

Authors: Yael Mathov, Eden Levy, Ziv Katzir, Asaf Shabtai, Yuval Elovici | Published: 2020-10-07 | Updated: 2021-09-02
Membership Inference
Adversarial attack
Machine Learning

Constraining Logits by Bounded Function for Adversarial Robustness

Authors: Sekitoshi Kanai, Masanori Yamada, Shin'ya Yamaguchi, Hiroshi Takahashi, Yasutoshi Ida | Published: 2020-10-06
Robustness Improvement Method
Improvement of Learning
Adversarial attack