Adversarial attack

Adversarial Eigen Attack on Black-Box Models

Authors: Linjun Zhou, Peng Cui, Yinan Jiang, Shiqiang Yang | Published: 2020-08-27
Adversarial attack
Optimization Strategy
Deep Learning Technology

Stronger and Faster Wasserstein Adversarial Attacks

Authors: Kaiwen Wu, Allen Houze Wang, Yaoliang Yu | Published: 2020-08-06
Watermarking
Adversarial Learning
Adversarial attack

TREND: Transferability based Robust ENsemble Design

Authors: Deepak Ravikumar, Sangamesh Kodge, Isha Garg, Kaushik Roy | Published: 2020-08-04 | Updated: 2021-03-30
Adversarial Example
Adversarial attack
Transfer Learning

Robust and Accurate Authorship Attribution via Program Normalization

Authors: Yizhen Wang, Mohannad Alhanahnah, Ke Wang, Mihai Christodorescu, Somesh Jha | Published: 2020-07-01 | Updated: 2022-02-25
Membership Inference
Robustness
Adversarial attack

Opportunities and Challenges in Deep Learning Adversarial Robustness: A Survey

Authors: Samuel Henrique Silva, Peyman Najafirad | Published: 2020-07-01 | Updated: 2020-07-03
Poisoning
Adversarial Example
Adversarial attack

A Le Cam Type Bound for Adversarial Learning and Applications

Authors: Qiuling Xu, Kevin Bello, Jean Honorio | Published: 2020-07-01 | Updated: 2021-02-10
Adversarial Example
Adversarial attack
Machine Learning Method

Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection

Authors: Deqiang Li, Qianmu Li | Published: 2020-06-30
Poisoning
Malware Evolution
Adversarial attack

FDA3 : Federated Defense Against Adversarial Attacks for Cloud-Based IIoT Applications

Authors: Yunfei Song, Tian Liu, Tongquan Wei, Xiangfeng Wang, Zhe Tao, Mingsong Chen | Published: 2020-06-28
Adversarial Example
Adversarial attack
Defense Mechanism

ATOM: Robustifying Out-of-distribution Detection Using Outlier Mining

Authors: Jiefeng Chen, Yixuan Li, Xi Wu, Yingyu Liang, Somesh Jha | Published: 2020-06-26 | Updated: 2021-06-30
Out-of-Distribution Detection
Adversarial Example Detection
Adversarial attack

Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?

Authors: Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu | Published: 2020-06-26 | Updated: 2022-07-28
Backdoor Attack
Adversarial Example Detection
Adversarial attack