Defense Method

TensorShield: Tensor-based Defense Against Adversarial Attacks on Images

Authors: Negin Entezari, Evangelos E. Papalexakis | Published: 2020-02-18
Performance Evaluation
Adversarial Example
Defense Method

Data and Model Dependencies of Membership Inference Attack

Authors: Shakila Mahjabin Tonni, Dinusha Vatsalan, Farhad Farokhi, Dali Kaafar, Zhigang Lu, Gioacchino Tangari | Published: 2020-02-17 | Updated: 2020-07-25
Training Method
Model Selection Method
Defense Method

Undersensitivity in Neural Reading Comprehension

Authors: Johannes Welbl, Pasquale Minervini, Max Bartolo, Pontus Stenetorp, Sebastian Riedel | Published: 2020-02-15
Training Method
Vulnerability Attack Method
Defense Method

Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets

Authors: Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey, Xingjun Ma | Published: 2020-02-14
Poisoning
Adversarial Attack Detection
Defense Method

Politics of Adversarial Machine Learning

Authors: Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar | Published: 2020-02-01 | Updated: 2020-04-26
Membership Inference
Human Rights and Technology
Defense Method

Adversarial Robustness Assessment: Why both $L_0$ and $L_\infty$ Attacks Are Necessary

Authors: Shashank Kotyan, Danilo Vasconcellos Vargas | Published: 2019-06-14 | Updated: 2020-07-16
Adversarial Example
Adversarial Learning
Defense Method

Deep Reinforcement Learning for Cyber Security

Authors: Thanh Thi Nguyen, Vijay Janapa Reddi | Published: 2019-06-13 | Updated: 2021-11-02
Automation of Cybersecurity
Deep Reinforcement Learning
Defense Method

Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective

Authors: Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, Xue Lin | Published: 2019-06-10 | Updated: 2019-10-14
Adversarial Learning
Selection and Evaluation of Optimization Algorithms
Defense Method

Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers

Authors: Hadi Salman, Greg Yang, Jerry Li, Pengchuan Zhang, Huan Zhang, Ilya Razenshteyn, Sebastien Bubeck | Published: 2019-06-09 | Updated: 2020-01-10
Poisoning
Adversarial Learning
Defense Method

Adversarial Attack Generation Empowered by Min-Max Optimization

Authors: Jingkang Wang, Tianyun Zhang, Sijia Liu, Pin-Yu Chen, Jiacen Xu, Makan Fardad, Bo Li | Published: 2019-06-09 | Updated: 2021-11-01
Adversarial Learning
Deep Learning
Defense Method