Adversarial attack

Simple Transparent Adversarial Examples

Authors: Jaydeep Borkar, Pin-Yu Chen | Published: 2021-05-20
Watermarking
Adversarial attack
Vulnerability Attack Method

Incompatibility Clustering as a Defense Against Backdoor Poisoning Attacks

Authors: Charles Jin, Melinda Sun, Martin Rinard | Published: 2021-05-08 | Updated: 2023-04-27
Poisoning
Adversarial attack
Defense Mechanism

Attack-agnostic Adversarial Detection on Medical Data Using Explainable Machine Learning

Authors: Matthew Watson, Noura Al Moubayed | Published: 2021-05-05
Medical Image Analysis
Vulnerability of Adversarial Examples
Adversarial attack

Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling

Authors: Md Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh | Published: 2021-03-11
Model Performance Evaluation
Reverse Engineering
Adversarial attack

BODAME: Bilevel Optimization for Defense Against Model Extraction

Authors: Yuto Mori, Atsushi Nitanda, Akiko Takeda | Published: 2021-03-11
Model Performance Evaluation
Adversarial attack
Selection and Evaluation of Optimization Algorithms

TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack

Authors: Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici | Published: 2021-03-10
Attack Detection
Adversarial attack
Threat Model

Diagnosing Vulnerability of Variational Auto-Encoders to Adversarial Attacks

Authors: Anna Kuzina, Max Welling, Jakub M. Tomczak | Published: 2021-03-10 | Updated: 2021-05-06
Model Performance Evaluation
Adversarial attack
Vulnerability Analysis

Proof-of-Learning: Definitions and Practice

Authors: Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Anvith Thudi, Varun Chandrasekaran, Nicolas Papernot | Published: 2021-03-09
Data Dependency
Model Performance Evaluation
Adversarial attack

Generating Black-Box Adversarial Examples in Sparse Domain

Authors: Hadi Zanddizari, Behnam Zeinali, J. Morris Chang | Published: 2021-01-22 | Updated: 2021-10-15
Performance Evaluation
Adversarial Example
Adversarial attack

Voting based ensemble improves robustness of defensive models

Authors: Devvrit, Minhao Cheng, Cho-Jui Hsieh, Inderjit Dhillon | Published: 2020-11-28
Model Performance Evaluation
Attack Type
Adversarial attack