Adversarial attack

Downscaling Attack and Defense: Turning What You See Back Into What You Get

Authors: Andrew J. Lohn | Published: 2020-10-06 | Updated: 2020-10-07
Attack Type
Adversarial attack
Image Processing

Adversarial Boot Camp: label free certified robustness in one epoch

Authors: Ryan Campbell, Chris Finlay, Adam M Oberman | Published: 2020-10-05
Robustness Improvement Method
Improvement of Learning
Adversarial attack

Model extraction from counterfactual explanations

Authors: Ulrich Aïvodji, Alexandre Bolot, Sébastien Gambs | Published: 2020-09-03
Model Extraction Attack
Causal Interpretation
Adversarial attack

Yet Meta Learning Can Adapt Fast, It Can Also Break Easily

Authors: Han Xu, Yaxin Li, Xiaorui Liu, Hui Liu, Jiliang Tang | Published: 2020-09-02
Meta-Learning Method
Adversarial Example
Adversarial attack

Adversarial Attacks on Deep Learning Systems for User Identification based on Motion Sensors

Authors: Cezara Benegui, Radu Tudor Ionescu | Published: 2020-09-02 | Updated: 2020-11-05
Adversarial Example
Adversarial attack
Deep Learning Technology

Vulnerability-Aware Poisoning Mechanism for Online RL with Unknown Dynamics

Authors: Yanchao Sun, Da Huo, Furong Huang | Published: 2020-09-02 | Updated: 2022-02-15
Reinforcement Learning Algorithm
Adversarial attack
Optimization Strategy

MALCOM: Generating Malicious Comments to Attack Neural Fake News Detection Models

Authors: Thai Le, Suhang Wang, Dongwon Lee | Published: 2020-09-01 | Updated: 2020-09-27
Data Generation
Text Generation Method
Adversarial attack

Imitation Privacy

Authors: Xun Xian, Xinran Wang, Mingyi Hong, Jie Ding, Reza Ghanadan | Published: 2020-08-30
Data Generation
Information Hiding Techniques
Adversarial attack

Benchmarking adversarial attacks and defenses for time-series data

Authors: Shoaib Ahmed Siddiqui, Andreas Dengel, Sheraz Ahmed | Published: 2020-08-30
Adversarial Example
Adversarial attack
Deep Learning Technology

Adversarial Privacy Preserving Graph Embedding against Inference Attack

Authors: Kaiyang Li, Guangchun Luo, Yang Ye, Wei Li, Shihao Ji, Zhipeng Cai | Published: 2020-08-30
Privacy Protection
Membership Inference
Adversarial attack