Detecting Potential Local Adversarial Examples for Human-Interpretable Defense

Authors: Xavier Renard, Thibault Laugel, Marie-Jeanne Lesot, Christophe Marsala, Marcin Detyniecki | Published: 2018-09-07

Are adversarial examples inevitable?

Authors: Ali Shafahi, W. Ronny Huang, Christoph Studer, Soheil Feizi, Tom Goldstein | Published: 2018-09-06 | Updated: 2020-02-03

IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection

Authors: Zilong Lin, Yong Shi, Zhi Xue | Published: 2018-09-06 | Updated: 2022-05-08

Adversarial Reprogramming of Text Classification Neural Networks

Authors: Paarth Neekhara, Shehzeen Hussain, Shlomo Dubnov, Farinaz Koushanfar | Published: 2018-09-06 | Updated: 2019-08-15

Bridging machine learning and cryptography in defence against adversarial attacks

Authors: Olga Taran, Shideh Rezaeifar, Slava Voloshynovskiy | Published: 2018-09-05

Adversarial Attacks on Node Embeddings via Graph Poisoning

Authors: Aleksandar Bojchevski, Stephan Günnemann | Published: 2018-09-04 | Updated: 2019-05-27

HASP: A High-Performance Adaptive Mobile Security Enhancement Against Malicious Speech Recognition

Authors: Zirui Xu, Fuxun Yu, Chenchen Liu, Xiang Chen | Published: 2018-09-04

IoTDots: A Digital Forensics Framework for Smart Environments

Authors: Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac | Published: 2018-09-03

Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques

Authors: Dorjan Hitaj, Luigi V. Mancini | Published: 2018-09-03

Adversarial Attack Type I: Cheat Classifiers by Significant Changes

Authors: Sanli Tang, Xiaolin Huang, Mingjian Chen, Chengjin Sun, Jie Yang | Published: 2018-09-03 | Updated: 2019-07-22