Adversarial attack

Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the Age of AI-NIDS

Authors: Christian Schroeder de Witt, Yongchao Huang, Philip H. S. Torr, Martin Strohmeier | Published: 2021-11-23
Reinforcement Learning
Adversarial attack
Deep Reinforcement Learning

A Comparison of State-of-the-Art Techniques for Generating Adversarial Malware Binaries

Authors: Prithviraj Dasgupta, Zachariah Osman | Published: 2021-11-22
Malware Detection Method
Adversarial attack
Malware Detection with Limited Samples

Evaluating Adversarial Attacks on ImageNet: A Reality Check on Misclassification Classes

Authors: Utku Ozbulak, Maura Pintor, Arnout Van Messem, Wesley De Neve | Published: 2021-11-22
Poisoning
Adversarial Example
Adversarial attack

Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Model

Authors: Alon Zolfi, Shai Avidan, Yuval Elovici, Asaf Shabtai | Published: 2021-11-21 | Updated: 2022-09-07
Impact of Generalization
Adversarial attack
Face Recognition System

Fooling Adversarial Training with Inducing Noise

Authors: Zhirui Wang, Yifei Wang, Yisen Wang | Published: 2021-11-19
Training Data Generation
Poisoning
Adversarial attack

A Review of Adversarial Attack and Defense for Classification Methods

Authors: Yao Li, Minhao Cheng, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-11-18
Adversarial Example
Adversarial attack
Defense Mechanism

Enhanced Membership Inference Attacks against Machine Learning Models

Authors: Jiayuan Ye, Aadyaa Maddi, Sasi Kumar Murakonda, Vincent Bindschaedler, Reza Shokri | Published: 2021-11-18 | Updated: 2022-09-13
Poisoning
Membership Inference
Adversarial attack

Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks

Authors: Kaleel Mahmood, Rigel Mahmood, Ethan Rathbun, Marten van Dijk | Published: 2021-09-29
Backdoor Attack
Poisoning
Adversarial attack

GANG-MAM: GAN based enGine for Modifying Android Malware

Authors: Renjith G, Sonia Laudanna, Aji S, Corrado Aaron Visaggio, Vinod P | Published: 2021-09-27
Software Security
Malware Detection Method
Adversarial attack

Adversarial Transfer Attacks With Unknown Data and Class Overlap

Authors: Luke E. Richards, André Nguyen, Ryan Capps, Steven Forsythe, Cynthia Matuszek, Edward Raff | Published: 2021-09-23 | Updated: 2021-09-24
Poisoning
Robustness
Adversarial attack