Adversarial attack

Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer

Authors: Hsueh-Ti Derek Liu, Michael Tao, Chun-Liang Li, Derek Nowrouzezahrai, Alec Jacobson | Published: 2018-08-08 | Updated: 2019-02-17
Adversarial Learning
Adversarial attack
Machine Learning Method

Adversarial Vision Challenge

Authors: Wieland Brendel, Jonas Rauber, Alexey Kurakin, Nicolas Papernot, Behar Veliqi, Marcel Salathé, Sharada P. Mohanty, Matthias Bethge | Published: 2018-08-06 | Updated: 2018-12-06
Certified Robustness
Adversarial Learning
Adversarial attack

Structured Adversarial Attack: Towards General Implementation and Better Interpretability

Authors: Kaidi Xu, Sijia Liu, Pu Zhao, Pin-Yu Chen, Huan Zhang, Quanfu Fan, Deniz Erdogmus, Yanzhi Wang, Xue Lin | Published: 2018-08-05 | Updated: 2019-02-19
Certified Robustness
Adversarial attack
Interpretation Method

ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples

Authors: Xinbo Liu, Jiliang Zhang, Yaping Lin, He Li | Published: 2018-08-05 | Updated: 2019-12-30
Certified Robustness
Model Extraction Attack
Adversarial attack

DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes

Authors: Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar | Published: 2018-08-03 | Updated: 2020-04-23
Certified Robustness
Adversarial Example
Adversarial attack

Security and Privacy Issues in Deep Learning

Authors: Ho Bae, Jaehee Jang, Dahuin Jung, Hyemi Jang, Heonseok Ha, Hyungyu Lee, Sungroh Yoon | Published: 2018-07-31 | Updated: 2021-03-10
Differential Privacy
Adversarial Example Detection
Adversarial attack

Rob-GAN: Generator, Discriminator, and Adversarial Attacker

Authors: Xuanqing Liu, Cho-Jui Hsieh | Published: 2018-07-27 | Updated: 2019-04-15
Robustness Evaluation
Adversarial Learning
Adversarial attack

Simultaneous Adversarial Training – Learn from Others Mistakes

Authors: Zukang Liao | Published: 2018-07-21 | Updated: 2018-09-10
Certified Robustness
Robustness Evaluation
Adversarial attack

Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors

Authors: Andrew Ilyas, Logan Engstrom, Aleksander Madry | Published: 2018-07-20 | Updated: 2019-03-28
Model Evaluation
Adversarial attack

Machine Learning Attack and Defense on Voltage Over-scaling-based Lightweight Authentication

Authors: Jiliang Zhang, Haihan Su | Published: 2018-07-20 | Updated: 2018-10-18
Model Design and Accuracy
Adversarial attack
Machine Learning