敵対的攻撃手法

Adversarial Recommendation: Attack of the Learned Fake Users

Authors: Konstantina Christakopoulou, Arindam Banerjee | Published: 2018-09-21
敵対的サンプル
敵対的攻撃手法
生成モデル

Adversarial Binaries for Authorship Identification

Authors: Xiaozhu Meng, Barton P. Miller, Somesh Jha | Published: 2018-09-21 | Updated: 2018-11-07
バイナリ多様化
敵対的学習
敵対的攻撃手法

Playing the Game of Universal Adversarial Perturbations

Authors: Julien Perolat, Mateusz Malinowski, Bilal Piot, Olivier Pietquin | Published: 2018-09-20 | Updated: 2018-09-25
ロバスト性向上手法
敵対的学習
敵対的攻撃手法

HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples

Authors: Deqiang Li, Ramesh Baral, Tao Li, Han Wang, Qianmu Li, Shouhuai Xu | Published: 2018-09-18
ロバスト性向上手法
敵対的サンプル
敵対的攻撃手法

Adversarial Reinforcement Learning for Observer Design in Autonomous Systems under Cyber Attacks

Authors: Abhishek Gupta, Zhaoyuan Yang | Published: 2018-09-15
オンライン学習
ロバスト性向上手法
敵対的攻撃手法

Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers

Authors: Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach | Published: 2018-04-23 | Updated: 2020-10-03
クエリ生成手法
モデルの頑健性保証
敵対的攻撃手法

Black-box Adversarial Attacks with Limited Queries and Information

Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin | Published: 2018-04-23 | Updated: 2018-07-11
モデル抽出攻撃
敵対的サンプル
敵対的攻撃手法

Gradient Masking Causes CLEVER to Overestimate Adversarial Perturbation Size

Authors: Ian Goodfellow | Published: 2018-04-21
敵対的学習
敵対的攻撃手法
透かし技術

ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector

Authors: Shang-Tse Chen, Cory Cornelius, Jason Martin, Duen Horng Chau | Published: 2018-04-16 | Updated: 2019-05-01
Faster R-CNN
モデルの頑健性保証
敵対的攻撃手法

On the Limitation of MagNet Defense against $L_1$-based Adversarial Examples

Authors: Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu | Published: 2018-04-14 | Updated: 2018-05-09
敵対的サンプルの検知
敵対的攻撃手法
透かし技術