Hear “No Evil”, See “Kenansville”: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems

Authors: Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor | Published: 2019-10-11

Defending Neural Backdoors via Generative Distribution Modeling

Authors: Ximing Qiao, Yukun Yang, Hai Li | Published: 2019-10-10 | Updated: 2019-11-06

Adversarial Training: embedding adversarial perturbations into the parameter space of a neural network to build a robust system

Authors: Shixian Wen, Laurent Itti | Published: 2019-10-09

Membership Model Inversion Attacks for Deep Networks

Authors: Samyadeep Basu, Rauf Izmailov, Chris Mesterharm | Published: 2019-10-09

Defensive Escort Teams via Multi-Agent Deep Reinforcement Learning

Authors: Arpit Garg, Yazied A. Hasan, Adam Yañez, Lydia Tapia | Published: 2019-10-09

Deep Latent Defence

Authors: Giulio Zizzo, Chris Hankin, Sergio Maffeis, Kevin Jones | Published: 2019-10-09 | Updated: 2020-09-27

Adversarial Learning of Deepfakes in Accounting

Authors: Marco Schreyer, Timur Sattarov, Bernd Reimer, Damian Borth | Published: 2019-10-09

SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations

Authors: Ali Dabouei, Sobhan Soleymani, Fariborz Taherkhani, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2019-10-08

Directional Adversarial Training for Cost Sensitive Deep Learning Classification Applications

Authors: Matteo Terzi, Gian Antonio Susto, Pratik Chaudhari | Published: 2019-10-08

Detecting AI Trojans Using Meta Neural Analysis

Authors: Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li | Published: 2019-10-08 | Updated: 2020-10-01