Adversarial attack

Adversarial Robustness via Label-Smoothing

Authors: Morgane Goibert, Elvis Dohmatob | Published: 2019-06-27 | Updated: 2019-10-15
Adversarial Example
Adversarial attack
Deep Learning Method

Adversarial Examples to Fool Iris Recognition Systems

Authors: Sobhan Soleymani, Ali Dabouei, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2019-06-21 | Updated: 2019-07-18
Adversarial Example
Adversarial attack
Deep Learning Method

Deep Leakage from Gradients

Authors: Ligeng Zhu, Zhijian Liu, Song Han | Published: 2019-06-21 | Updated: 2019-12-19
Privacy Protection
Adversarial attack
Defensive Deception

Misleading Authorship Attribution of Source Code using Adversarial Learning

Authors: Erwin Quiring, Alwin Maier, Konrad Rieck | Published: 2019-05-29 | Updated: 2019-05-31
Attack Evaluation
Adversarial attack
Author Attribution Method

CopyCAT: Taking Control of Neural Policies with Constant Attacks

Authors: Léonard Hussenot, Matthieu Geist, Olivier Pietquin | Published: 2019-05-29 | Updated: 2020-01-21
Effective Perturbation Methods
Adversarial attack
Deep Learning

Expected Tight Bounds for Robust Training

Authors: Salman Alsubaihi, Adel Bibi, Modar Alfadly, Abdullah Hamdi, Bernard Ghanem | Published: 2019-05-28 | Updated: 2021-06-12
Robustness Improvement Method
Adversarial attack
Deep Learning

Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks

Authors: Fatemeh Sheikholeslami, Swayambhoo Jain, Georgios B. Giannakis | Published: 2019-04-05 | Updated: 2020-10-15
Adversarial attack
Machine Learning Algorithm
Deep Learning Method

White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks

Authors: Yotam Gil, Yoav Chai, Or Gorodissky, Jonathan Berant | Published: 2019-04-04
Adversarial attack
Machine Learning Algorithm
Machine Learning Application

HopSkipJumpAttack: A Query-Efficient Decision-Based Attack

Authors: Jianbo Chen, Michael I. Jordan, Martin J. Wainwright | Published: 2019-04-03 | Updated: 2020-04-28
Adversarial Example
Adversarial attack
Distance Evaluation Method

Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models

Authors: Adith Boloor, Xin He, Christopher Gill, Yevgeniy Vorobeychik, Xuan Zhang | Published: 2019-03-12
Certified Robustness
Adversarial attack
Physical attack