Adversarial attack

Deep Leakage from Gradients

Authors: Ligeng Zhu, Zhijian Liu, Song Han | Published: 2019-06-21 | Updated: 2019-12-19
Privacy Protection
Adversarial attack
Defensive Deception

Misleading Authorship Attribution of Source Code using Adversarial Learning

Authors: Erwin Quiring, Alwin Maier, Konrad Rieck | Published: 2019-05-29 | Updated: 2019-05-31
Attack Evaluation
Adversarial attack
Author Attribution Method

CopyCAT: Taking Control of Neural Policies with Constant Attacks

Authors: Léonard Hussenot, Matthieu Geist, Olivier Pietquin | Published: 2019-05-29 | Updated: 2020-01-21
Effective Perturbation Methods
Adversarial attack
Deep Learning

Expected Tight Bounds for Robust Training

Authors: Salman Alsubaihi, Adel Bibi, Modar Alfadly, Abdullah Hamdi, Bernard Ghanem | Published: 2019-05-28 | Updated: 2021-06-12
Robustness Improvement Method
Adversarial attack
Deep Learning

Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks

Authors: Fatemeh Sheikholeslami, Swayambhoo Jain, Georgios B. Giannakis | Published: 2019-04-05 | Updated: 2020-10-15
Adversarial attack
Machine Learning Algorithm
Deep Learning Method

White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks

Authors: Yotam Gil, Yoav Chai, Or Gorodissky, Jonathan Berant | Published: 2019-04-04
Adversarial attack
Machine Learning Algorithm
Machine Learning Application

HopSkipJumpAttack: A Query-Efficient Decision-Based Attack

Authors: Jianbo Chen, Michael I. Jordan, Martin J. Wainwright | Published: 2019-04-03 | Updated: 2020-04-28
Adversarial Example
Adversarial attack
Distance Evaluation Method

Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models

Authors: Adith Boloor, Xin He, Christopher Gill, Yevgeniy Vorobeychik, Xuan Zhang | Published: 2019-03-12
Certified Robustness
Adversarial attack
Physical attack

A Little Is Enough: Circumventing Defenses For Distributed Learning

Authors: Moran Baruch, Gilad Baruch, Yoav Goldberg | Published: 2019-02-16
Adversarial Learning
Adversarial attack
Adversarial Attack Methods

Mitigation of Adversarial Examples in RF Deep Classifiers Utilizing AutoEncoder Pre-training

Authors: Silvija Kokalj-Filipovic, Rob Miller, Nicholas Chang, Chi Leung Lau | Published: 2019-02-16
Poisoning
Adversarial attack
Adversarial Attack Methods