Adversarial attack

Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding

Authors: Tong Chen, Wenjia Niu, Yingxiao Xiang, Xiaoxuan Bai, Jiqiang Liu, Zhen Han, Gang Li | Published: 2018-07-18
Poisoning
Adversarial Learning
Adversarial attack

Motivating the Rules of the Game for Adversarial Example Research

Authors: Justin Gilmer, Ryan P. Adams, Ian Goodfellow, David Andersen, George E. Dahl | Published: 2018-07-18 | Updated: 2018-07-20
Certified Robustness
Adversarial Example
Adversarial attack

Online Robust Policy Learning in the Presence of Unknown Adversaries

Authors: Aaron J. Havens, Zhanhong Jiang, Soumik Sarkar | Published: 2018-07-16
Policy engineering
Robustness Evaluation
Adversarial attack

Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach

Authors: Minhao Cheng, Thong Le, Pin-Yu Chen, Jinfeng Yi, Huan Zhang, Cho-Jui Hsieh | Published: 2018-07-12
Model Evaluation
Adversarial attack
Encryption Technology

Deep Learning for Launching and Mitigating Wireless Jamming Attacks

Authors: Tugba Erpek, Yalin E. Sagduyu, Yi Shi | Published: 2018-07-03 | Updated: 2018-12-13
Training Data Generation
Adversarial attack
Defense Method

On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses

Authors: Anish Athalye, Nicholas Carlini | Published: 2018-04-10
Certified Robustness
Adversarial attack
Watermark

Adversarial Training Versus Weight Decay

Authors: Angus Galloway, Thomas Tanay, Graham W. Taylor | Published: 2018-04-10 | Updated: 2018-07-23
Certified Robustness
Adversarial Learning
Adversarial attack

An ADMM-Based Universal Framework for Adversarial Attacks on Deep Neural Networks

Authors: Pu Zhao, Sijia Liu, Yanzhi Wang, Xue Lin | Published: 2018-04-09
Backdoor Detection
Adversarial Example
Adversarial attack

Fortified Networks: Improving the Robustness of Deep Networks by Modeling the Manifold of Hidden Representations

Authors: Alex Lamb, Jonathan Binas, Anirudh Goyal, Dmitriy Serdyuk, Sandeep Subramanian, Ioannis Mitliagkas, Yoshua Bengio | Published: 2018-04-07
Certified Robustness
Adversarial attack
Robustness of Deep Networks

Adversarial Attacks and Defences Competition

Authors: Alexey Kurakin, Ian Goodfellow, Samy Bengio, Yinpeng Dong, Fangzhou Liao, Ming Liang, Tianyu Pang, Jun Zhu, Xiaolin Hu, Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, Alan Yuille, Sangxia Huang, Yao Zhao, Yuzhe Zhao, Zhonglin Han, Junjiajia Long, Yerkebulan Berdibekov, Takuya Akiba, Seiya Tokui, Motoki Abe | Published: 2018-03-31
Certified Robustness
Adversarial attack
Robustness of Deep Networks