Adversarial attack

Protection against Cloning for Deep Learning

Authors: Richard Kenway | Published: 2018-03-29
Detection of Model Extraction Attacks
Adversarial attack
Robustness of Deep Networks

Defending against Adversarial Images using Basis Functions Transformations

Authors: Uri Shaham, James Garritano, Yutaro Yamada, Ethan Weinberger, Alex Cloninger, Xiuyuan Cheng, Kelly Stanton, Yuval Kluger | Published: 2018-03-28 | Updated: 2018-04-16
Watermarking
Certified Robustness
Adversarial attack

Bypassing Feature Squeezing by Increasing Adversary Strength

Authors: Yash Sharma, Pin-Yu Chen | Published: 2018-03-27
Experimental Validation
Adversarial Learning
Adversarial attack

The Hidden Vulnerability of Distributed Learning in Byzantium

Authors: El Mahdi El Mhamdi, Rachid Guerraoui, Sébastien Rouault | Published: 2018-02-22 | Updated: 2018-07-17
Poisoning
Adversarial attack
Machine Learning Method

Attack Strength vs. Detectability Dilemma in Adversarial Machine Learning

Authors: Christopher Frederickson, Michael Moore, Glenn Dawson, Robi Polikar | Published: 2018-02-20
Poisoning
Adversarial Example Detection
Adversarial attack

Shield: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression

Authors: Nilaksh Das, Madhuri Shanbhogue, Shang-Tse Chen, Fred Hohman, Siwei Li, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2018-02-19
Certified Robustness
Adversarial attack
Machine Learning Method

Are Generative Classifiers More Robust to Adversarial Attacks?

Authors: Yingzhen Li, John Bradshaw, Yash Sharma | Published: 2018-02-19 | Updated: 2019-05-27
Robustness Evaluation
Adversarial Learning
Adversarial attack

Adversarial Risk and the Dangers of Evaluating Against Weak Attacks

Authors: Jonathan Uesato, Brendan O'Donoghue, Aaron van den Oord, Pushmeet Kohli | Published: 2018-02-15 | Updated: 2018-06-12
Adversarial Learning
Adversarial Learning
Adversarial attack

Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks

Authors: Qi Liu, Tao Liu, Zihao Liu, Yanzhi Wang, Yier Jin, Wujie Wen | Published: 2018-02-14 | Updated: 2018-03-19
Certified Robustness
Adversarial Example
Adversarial attack

Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection

Authors: Andrea Paudice, Luis Muñoz-González, Andras Gyorgy, Emil C. Lupu | Published: 2018-02-08
Poisoning
Adversarial attack
Detection of Poisonous Data