Writing
A Complete List of All (arXiv) Adversarial Example Papers

by Nicholas Carlini 2019-06-15



It can be hard to stay up-to-date on the published papers in the field of adversarial examples, where we have seen massive growth in the number of papers written each year. I have been somewhat religiously keeping track of these papers for the last few years, and realized it may be helpful for others to release this list.

The only requirement I used for selecting papers for this list is that it is primarily a paper about adversarial examples, or extensively uses adversarial examples. Due to the sheer quantity of papers, I can't guarantee that I actually have found all of them.

But I did try.

I also may have included papers that don't match these criteria (and are about something different instead), or made inconsistent judgement calls as to whether or not any given paper is mainly an adversarial example paper. Send me an email if something is wrong and I'll correct it.

As a result, this list is completely un-filtered. Everything that mainly presents itself as an adversarial example paper is listed here; I pass no judgement of quality. For a curated list of papers that I think are excellent and worth reading, see the Adversarial Machine Learning Reading List.

One final note about the data. This list automatically updates with new papers, even before I get a chance to manually filter through them. I do this filtering roughly twice a week, and it's then that I'll remove the ones that aren't related to adversarial examples. As a result, there may be some false positives on the most recent few entries. The new un-verified entries will have a probability indicated that my simplistic (but reasonably well calibrated) bag-of-words classifier believes the given paper is actually about adversarial examples.

The full paper list appears below. I've also released a TXT file (and a TXT file with abstracts) and a JSON file with the same data. If you do anything interesting with this data I'd be happy to hear from you what it was.


Paper List

2019-11-20 Fine-grained Synthesis of Unrestricted Adversarial Examples. (99%)Omid Poursaeed; Tianxing Jiang; Harry Yang; Serge Belongie; Ser-Nam Lim Deep Minimax Probability Machine. (99%)Lirong He; Ziyi Guo; Kaizhu Huang; Zenglin Xu Analysis of Deep Networks for Monocular Depth Estimation Through Adversarial Attacks with Proposal of a Defense Method. (84%)Junjie Hu; Takayuki Okatani Evaluating the Transferability and Adversarial Discrimination of Convolutional Neural Networks for Threat Object Detection and Classification within X-Ray Security Imagery. (2%)Yona Falinie A. Gaus; Neelanjan Bhowmik; Samet Akcay; Toby P. Breckon Outside the Box: Abstraction-Based Monitoring of Neural Networks. (2%)Thomas A. Henzinger; Anna Lukina; Christian Schilling 2019-11-19 Defective Convolutional Layers Learn Robust CNNs. (99%)Tiange Luo; Tianle Cai; Mengxiao Zhang; Siyu Chen; Di He; Liwei Wang Generate (non-software) Bugs to Fool Classifiers. (99%)Hiromu Yakura; Youhei Akimoto; Jun Sakuma Adversarial Robustness of Flow-Based Generative Models. (96%)Phillip Pope; Yogesh Balaji; Soheil Feizi Where is the Bottleneck of Adversarial Learning with Unlabeled Data?. (92%)Jingfeng Zhang; Bo Han; Gang Niu; Tongliang Liu; Masashi Sugiyama Logic-inspired Deep Neural Networks. (67%)Minh Le Towards non-toxic landscapes: Automatic toxic comment detection using DNN. (1%)Ashwin Geet D'Sa; Irina Illina; Dominique Fohr 2019-11-18 Poison as a Cure: Detecting & Neutralizing Variable-Sized Backdoor Attacks in Deep Neural Networks. (92%)Alvin Chan; Yew-Soon Ong Deep Detector Health Management under Adversarial Campaigns. (87%)Javier Echauz; Keith Kenemer; Sarfaraz Hussein; Jay Dhaliwal; Saurabh Shintre; Slawomir Grzonkowski; Andrew Gardner Adversarial Attacks on Grid Events Classification: An Adversarial Machine Learning Approach. (83%)Iman Niazazari; Hanif Livani Can You Really Backdoor Federated Learning?. (82%)Ziteng Sun; Peter Kairouz; Ananda Theertha Suresh; H. Brendan McMahan WITCHcraft: Efficient PGD attacks with random step size. (81%)Ping-Yeh Chiang; Jonas Geiping; Micah Goldblum; Tom Goldstein; Renkun Ni; Steven Reich; Ali Shafahi A New Ensemble Adversarial Attack Powered by Long-term Gradient Memories. (78%)Zhaohui Che; Ali Borji; Guangtao Zhai; Suiyi Ling; Jing Li; Patrick Le Callet Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic. (38%)Zhen Xiang; David J. Miller; George Kesidis A novel method for identifying the deep neural network model with the Serial Number. (38%)XiangRui Xu; YaQin Li; Cao Yuan 2019-11-17 Smoothed Inference for Adversarially-Trained Models. (98%)Yaniv Nemcovsky; Evgenii Zheltonozhskii; Chaim Baskin; Brian Chmiel; Alex M. Bronstein; Avi Mendelson REFIT: a Unified Watermark Removal Framework for Deep Learning Systems with Limited Data. (87%)Xinyun Chen; Wenxiao Wang; Chris Bender; Yiming Ding; Ruoxi Jia; Bo Li; Dawn Song Countering Inconsistent Labelling by Google's Vision API for Rotated Images. (81%)Aman Apte; Aritra Bandyopadhyay; K Akhilesh Shenoy; Jason Peter Andrews; Aditya Rathod; Manish Agnihotri; Aditya Jajodia Deep Verifier Networks: Verification of Deep Discriminative Models with Deep Generative Models. (70%)Tong Che; Xiaofeng Liu; Site Li; Yubin Ge; Ruixiang Zhang; Caiming Xiong; Yoshua Bengio NeuronInspect: Detecting Backdoors in Neural Networks via Output Explanations. (61%)Xijie Huang; Moustafa Alzantot; Mani Srivastava Justification-Based Reliability in Machine Learning. (1%)Nurali Virani; Naresh Iyer; Zhaoyuan Yang 2019-11-16 Black-Box Adversarial Attack with Transferable Model-based Embedding. (99%)Zhichao Huang; Tong Zhang Defensive Few-shot Adversarial Learning. (99%)Wenbin Li; Lei Wang; Xingxing Zhang; Jing Huo; Yang Gao; Jiebo Luo Suspicion-Free Adversarial Attacks on Clustering Algorithms. (98%)Anshuman Chhabra; Abhishek Roy; Prasant Mohapatra SMART: Skeletal Motion Action Recognition aTtack. (96%)He Wang; Feixiang He; Zexi Peng; Yongliang Yang; Tianjia Shao; Kun Zhou; David Hogg Defending Against Model Stealing Attacks with Adaptive Misinformation. (93%)Sanjay Kariyappa; Moinuddin K Qureshi The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks. (86%)Yuheng Zhang; Ruoxi Jia; Hengzhi Pei; Wenxiao Wang; Bo Li; Dawn Song Signed Input Regularization. (15%)Saeid Asgari Taghanaki; Kumar Abhishek; Ghassan Hamarneh Maintaining Discrimination and Fairness in Class Incremental Learning. (1%)Bowen Zhao; Xi Xiao; Guojun Gan; Bin Zhang; Shutao Xia 2019-11-15 Learning To Characterize Adversarial Subspaces. (99%)Xiaofeng Mao; Yuefeng Chen; Yuhong Li; Yuan He; Hui Xue Simple iterative method for generating targeted universal adversarial perturbations. (99%)Hokuto Hirano; Kazuhiro Takemoto AdvKnn: Adversarial Attacks On K-Nearest Neighbor Classifiers With Approximate Gradients. (99%)Xiaodan Li; Yuefeng Chen; Yuan He; Hui Xue On Model Robustness Against Adversarial Examples. (98%)Shufei Zhang; Kaizhu Huang; Zenglin Xu Robust Reading Comprehension with Linguistic Constraints via Posterior Regularization. (82%)Mantong Zhou; Minlie Huang; Xiaoyan Zhu 2019-11-14 DomainGAN: Generating Adversarial Examples to Attack Domain Generation Algorithm Classifiers.Isaac Corley; Jonathan Lwowski; Justin Hoffman Self-supervised Adversarial Training. (99%)Kejiang Chen; Hang Zhou; Yuefeng Chen; Xiaofeng Mao; Yuhong Li; Yuan He; Hui Xue; Weiming Zhang; Nenghai Yu CAGFuzz: Coverage-Guided Adversarial Generative Fuzzing Testing of Deep Learning Systems. (99%)Pengcheng Zhang; Qiyin Dai; Patrizio Pelliccione 2019-11-13 There is Limited Correlation between Coverage and Robustness for Deep Neural Networks.Yizhen Dong; Peixin Zhang; Jingyi Wang; Shuang Liu; Jun Sun; Jianye Hao; Xinyu Wang; Li Wang; Jin Song Dong; Dai Ting Adversarial Margin Maximization Networks.Ziang Yan; Yiwen Guo; Changshui Zhang 2019-11-12 Improving Robustness of Task Oriented Dialog Systems.Arash Einolghozati; Sonal Gupta; Mrinal Mohit; Rushin Shah On Robustness to Adversarial Examples and Polynomial Optimization.Pranjal Awasthi; Abhratanu Dutta; Aravindan Vijayaraghavan Adversarial Examples in Modern Machine Learning: A Review.Rey Reza Wiyatno; Anqi Xu; Ousmane Dia; Berker Archy de 2019-11-11 RNN-Test: Adversarial Testing Framework for Recurrent Neural Network Systems.Jianmin Guo; Yue Zhao; Xueying Han; Yu Jiang; Jiaguang Sun Few-Features Attack to Fool Machine Learning Models through Mask-Based GAN.Feng Chen; Yunkai Shang; Bo Xu; Jincheng Hu CALPA-NET: Channel-pruning-assisted Deep Residual Network for Steganalysis of Digital Images.Shunquan Tan; Weilong Wu; Zilong Shao; Qiushi Li; Bin Li; Jiwu Huang Learning From Brains How to Regularize Machines.Zhe Li; Wieland Brendel; Edgar Y. Walker; Erick Cobos; Taliah Muhammad; Jacob Reimer; Matthias Bethge; Fabian H. Sinz; Xaq Pitkow; Andreas S. Tolias Robust Design of Deep Neural Networks against Adversarial Attacks based on Lyapunov Theory.Arash Rahnama; Andre T. Nguyen; Edward Raff GraphDefense: Towards Robust Graph Convolutional Networks.Xiaoyun Wang; Xuanqing Liu; Cho-Jui Hsieh 2019-11-09 A Reinforced Generation of Adversarial Samples for Neural Machine Translation.Wei Zou; Shujian Huang; Jun Xie; Xinyu Dai; Jiajun Chen Improving Machine Reading Comprehension via Adversarial Training.Ziqing Yang; Yiming Cui; Wanxiang Che; Ting Liu; Shijin Wang; Guoping Hu Adaptive versus Standard Descent Methods and Robustness Against Adversarial Examples.Marc Khoury Minimalistic Attacks: How Little it Takes to Fool a Deep Reinforcement Learning Policy.Xinghua Qu; Zhu Sun; Pengfei Wei; Yew-Soon Ong; Abhishek Gupta 2019-11-08 Intrusion Detection for Industrial Control Systems: Evaluation Analysis and Adversarial Attacks.Giulio Zizzo; Chris Hankin; Sergio Maffeis; Kevin Jones Domain Robustness in Neural Machine Translation.Mathias Müller; Annette Rios; Rico Sennrich Imperceptible Adversarial Attacks on Tabular Data.Vincent Ballet; Xavier Renard; Jonathan Aigrain; Thibault Laugel; Pascal Frossard; Marcin Detyniecki Adversarial Attacks on GMM i-vector based Speaker Verification Systems.Xu Li; Jinghua Zhong; Xixin Wu; Jianwei Yu; Xunying Liu; Helen Meng Patch augmentation: Towards efficient decision boundaries for neural networks. (99%)Marcus D. Bloice; Andreas Holzinger 2019-11-07 White-Box Target Attack for EEG-Based BCI Regression Problems.Lubin Meng; Chin-Teng Lin; Tzyy-Ring Jung; Dongrui Wu Active Learning for Black-Box Adversarial Attacks in EEG-Based Brain-Computer Interfaces.Xue Jiang; Xiao Zhang; Dongrui Wu 2019-11-06 How can we fool LIME and SHAP? Adversarial Attacks on Post hoc Explanation Methods.Dylan Slack; Sophie Hilgard; Emily Jia; Sameer Singh; Himabindu Lakkaraju Towards Large yet Imperceptible Adversarial Image Perturbations with Perceptual Color Distance.Zhengyu Zhao; Zhuoran Liu; Martha Larson Reversible Adversarial Examples based on Reversible Image Transformation.Hua Wang; Zhaoxia Yin The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey.Olakunle Ibitoye; Rana Abou-Khamis; Ashraf Matrawy; M. Omair Shafiq 2019-11-05 Adversarial Enhancement for Community Detection in Complex Networks.Jiajun Zhou; Zhi Chen; Min Du; Lihong Chen; Shanqing Yu; Feifei Li; Guanrong Chen; Qi Xuan Test Metrics for Recurrent Neural Networks.Wei Huang; Youcheng Sun; James Sharp; Xiaowei Huang Intriguing Properties of Adversarial ML Attacks in the Problem Space.Fabio Pierazzi; Feargus Pendlebury; Jacopo Cortellazzi; Lorenzo Cavallaro DLA: Dense-Layer-Analysis for Adversarial Example Detection.Philip Sperl; Ching-Yu Kao; Peng Chen; Konstantin Böttinger 2019-11-04 The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models.Ren Pang; Xinyang Zhang; Shouling Ji; Yevgeniy Vorobeychik; Xiaopu Luo; Ting Wang Persistency of Excitation for Robustness of Neural Networks.Kamil Nar; S. Shankar Sastry Fast-UAP: Algorithm for Speeding up Universal Adversarial Perturbation Generation with Orientation of Perturbation Vectors.Jiazhu Dai; Le Shu 2019-11-03 Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems.Guangke Chen; Sen Chen; Lingling Fan; Xiaoning Du; Zhe Zhao; Fu Song; Yang Liu Improved Detection of Adversarial Attacks via Penetration Distortion Maximization.Shai Rozenberg; Gal Elidan; Ran El-Yaniv 2019-11-02 Security of Facial Forensics Models Against Adversarial Attacks.Rong Huang; Fuming Fang; Huy H. Nguyen; Junichi Yamagishi; Isao Echizen 2019-10-31 Enhancing Certifiable Robustness via a Deep Model Ensemble.Huan Zhang; Minhao Cheng; Cho-Jui Hsieh Certifiable Robustness to Graph Perturbations.Aleksandar Bojchevski; Stephan Günnemann Adversarial Music: Real World Audio Adversary Against Wake-word Detection System.Juncheng B. Li; Shuhui Qu; Xinjian Li; J. Zico Kolter; Florian Metze 2019-10-30 Universal Adversarial Perturbations Against Person Re-Identification.Wenjie Ding; Xing Wei; Xiaopeng Hong; Rongrong Ji; Yihong Gong Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization.Rana Abou Khamis; Omair Shafiq; Ashraf Matrawy 2019-10-29 Adversarial Example in Remote Sensing Image Recognition.Li Chen; Guowei Zhu; Qi Li; Haifeng Li 2019-10-28 Active Subspace of Neural Networks: Structural Analysis and Universal Attacks.Chunfeng Cui; Kaiqi Zhang; Talgat Daulbaev; Julia Gusak; Ivan Oseledets; Zheng Zhang Certified Adversarial Robustness for Deep Reinforcement Learning.Björn Lütjens; Michael Everett; Jonathan P. How 2019-10-27 Open the Boxes of Words: Incorporating Sememes into Textual Adversarial Attack.Yuan Zang; Chenghao Yang; Fanchao Qi; Zhiyuan Liu; Meng Zhang; Qun Liu; Maosong Sun EdgeFool: An Adversarial Image Enhancement Filter.Ali Shahin Shamsabadi; Changjae Oh; Andrea Cavallaro Spot Evasion Attacks: Adversarial Examples for License Plate Recognition Systems with Convolution Neural Networks.Ya-guan Qian; Dan-feng Ma; Bin Wang; Jun Pan; Jian-Hai Chen; Jia-Min Wang; Jing-Sheng Lei 2019-10-26 Adversarial Defense Via Local Flatness Regularization.Jia Xu; Yiming Li; Yang Bai; Yong Jiang; Shu-Tao Xia Detection of Adversarial Attacks and Characterization of Adversarial Subspace.Mohammad Esmaeilpour; Patrick Cardinal; Alessandro Lameiras Koerich Understanding and Quantifying Adversarial Examples Existence in Linear Classification.Xupeng Shi; A. Adam Ding 2019-10-25 Effectiveness of random deep feature selection for securing image manipulation detectors against adversarial examples.M. Barni; E. Nowroozi; B. Tondi; B. Zhang MediaEval 2019: Concealed FGSM Perturbations for Privacy Preservation.Panagiotis Linardos; Suzanne Little; Kevin McGuinness Label Smoothing and Logit Squeezing: A Replacement for Adversarial Training?.Ali Shafahi; Amin Ghiasi; Furong Huang; Tom Goldstein 2019-10-24 ATZSL: Defensive Zero-Shot Recognition in the Presence of Adversaries.Xingxing Zhang; Shupeng Gui; Zhenfeng Zhu; Yao Zhao; Ji Liu 2019-10-23 A Useful Taxonomy for Adversarial Robustness of Neural Networks.Leslie N. Smith Wasserstein Smoothing: Certified Robustness against Wasserstein Adversarial Attacks.Alexander Levine; Soheil Feizi 2019-10-22 Attacking Optical Flow.Anurag Ranjan; Joel Janai; Andreas Geiger; Michael J. Black Cross-Representation Transferability of Adversarial Perturbations: From Spectrograms to Audio Waveforms.Karl M. Koerich; Mohammad Esmailpour; Sajjad Abdoli; Alceu S. Jr. Britto; Alessandro L. Koerich Adversarial Example Detection by Classification for Deep Speech Recognition.Saeid Samizade; Zheng-Hua Tan; Chao Shen; Xiaohong Guan Structure Matters: Towards Generating Transferable Adversarial Images.Dan Peng; Zizhan Zheng; Linhao Luo; Xiaofeng Zhang 2019-10-21 Recovering Localized Adversarial Attacks.Jan Philip Göpfert; Heiko Wersing; Barbara Hammer Learning to Learn by Zeroth-Order Oracle.Yangjun Ruan; Yuanhao Xiong; Sashank Reddi; Sanjiv Kumar; Cho-Jui Hsieh An Alternative Surrogate Loss for PGD-based Adversarial Testing.Sven Gowal; Jonathan Uesato; Chongli Qin; Po-Sen Huang; Timothy Mann; Pushmeet Kohli 2019-10-20 Enhancing Recurrent Neural Networks with Sememes.Yujia Qin; Fanchao Qi; Sicong Ouyang; Zhiyuan Liu; Cheng Yang; Yasheng Wang; Qun Liu; Maosong Sun 2019-10-19 Adversarial Attacks on Spoofing Countermeasures of automatic speaker verification.Songxiang Liu; Haibin Wu; Hung-yi Lee; Helen Meng 2019-10-18 Are Perceptually-Aligned Gradients a General Property of Robust Classifiers?.Simran Kaur; Jeremy Cohen; Zachary C. Lipton A Saddle-Point Dynamical System Approach for Robust Deep Learning.Yasaman Esfandiari; Keivan Ebrahimi; Aditya Balu; Nicola Elia; Umesh Vaidya; Soumik Sarkar Spatial-aware Online Adversarial Perturbations Against Visual Object Tracking.Qing Guo; Xiaofei Xie; Lei Ma; Zhongguo Li; Wei Feng; Yang Liu 2019-10-17 Evading Real-Time Person Detectors by Adversarial T-shirt.Kaidi Xu; Gaoyuan Zhang; Sijia Liu; Quanfu Fan; Mengshu Sun; Hongge Chen; Pin-Yu Chen; Yanzhi Wang; Xue Lin Instance adaptive adversarial training: Improved accuracy tradeoffs in neural nets.Yogesh Balaji; Tom Goldstein; Judy Hoffman Enforcing Linearity in DNN succours Robustness and Adversarial Image Generation.Anindya Sarkar; Nikhil Kumar Gupta; Raghu Iyengar LanCe: A Comprehensive and Lightweight CNN Defense Methodology against Physical Adversarial Attacks on Embedded Multimedia Applications.Zirui Xu; Fuxun Yu; Xiang Chen 2019-10-16 A New Defense Against Adversarial Images: Turning a Weakness into a Strength.Tao Yu; Shengyuan Hu; Chuan Guo; Wei-Lun Chao; Kilian Q. Weinberger 2019-10-15 On adversarial patches: real-world attack on ArcFace-100 face recognition system.Mikhail Pautov; Grigorii Melnikov; Edgar Kaziakhmedov; Klim Kireev; Aleksandr Petiushko Improving Robustness of time series classifier with Neural ODE guided gradient based data augmentation.Anindya Sarkar; Anirudh Sunder Raj; Raghu Sesha Iyengar Understanding Misclassifications by Attributes.Sadaf Gulshad; Zeynep Akata; Jan Hendrik Metzen; Arnold Smeulders Adversarial Examples for Models of Code.Noam Yefet; Uri Alon; Eran Yahav 2019-10-14 Real-world attack on MTCNN face detection system.Edgar Kaziakhmedov; Klim Kireev; Grigorii Melnikov; Mikhail Pautov; Aleksandr Petiushko DeepSearch: Simple and Effective Blackbox Fuzzing of Deep Neural Networks.Fuyuan Zhang; Sankalan Pal Chowdhury; Maria Christakis Confidence-Calibrated Adversarial Training: Towards Robust Models Generalizing Beyond the Attack Used During Training.David Stutz; Matthias Hein; Bernt Schiele ZO-AdaMM: Zeroth-Order Adaptive Momentum Method for Black-Box Optimization.Xiangyi Chen; Sijia Liu; Kaidi Xu; Xingguo Li; Xue Lin; Mingyi Hong; David Cox Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models.Derek Derui; Wang; Chaoran Li; Sheng Wen; Surya Nepal; Yang Xiang 2019-10-12 On Robustness of Neural Ordinary Differential Equations.Hanshu Yan; Jiawei Du; Vincent Y. F. Tan; Jiashi Feng 2019-10-11 Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems.Hadi Abdullah; Muhammad Sajidur Rahman; Washington Garcia; Logan Blue; Kevin Warren; Anurag Swarnim Yadav; Tom Shrimpton; Patrick Traynor Verification of Neural Networks: Specifying Global Robustness using Generative Models.Nathanaël Fijalkow; Mohit Kumar Gupta 2019-10-10 Information Robust Dirichlet Networks for Predictive Uncertainty Estimation.Theodoros Tsiligkaridis Universal Adversarial Perturbation for Text Classification.Hang Gao; Tim Oates 2019-10-09 Learning deep forest with multi-scale Local Binary Pattern features for face anti-spoofing.Rizhao Cai; Changsheng Chen Adversarial Learning of Deepfakes in Accounting.Marco Schreyer; Timur Sattarov; Bernd Reimer; Damian Borth Deep Latent Defence.Giulio Zizzo; Chris Hankin; Sergio Maffeis; Kevin Jones Adversarial Training: embedding adversarial perturbations into the parameter space of a neural network to build a robust system.Shixian Wen; Laurent Itti 2019-10-08 Directional Adversarial Training for Cost Sensitive Deep Learning Classification Applications.Matteo Terzi; Gian Antonio Susto; Pratik Chaudhari SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations.Ali Dabouei; Sobhan Soleymani; Fariborz Taherkhani; Jeremy Dawson; Nasser M. Nasrabadi 2019-10-07 Interpretable Disentanglement of Neural Networks by Extracting Class-Specific Subnetwork.Yulong Wang; Xiaolin Hu; Hang Su 2019-10-05 Yet another but more efficient black-box adversarial attack: tiling and evolution strategies.Laurent Meunier; Jamal Atif; Olivier Teytaud Unrestricted Adversarial Attacks for Semantic Segmentation.Guangyu Shen; Chengzhi Mao; Junfeng Yang; Baishakhi Ray 2019-10-04 Requirements for Developing Robust Neural Networks.John S. Hyatt; Michael S. Lee Adversarial Examples for Cost-Sensitive Classifiers.Gavin S. Hartnett; Andrew J. Lohn; Alexander P. Sedlack 2019-10-03 Verification of Neural Network Behaviour: Formal Guarantees for Power System Applications.Andreas Venzke; Spyros Chatzivasileiadis Perturbations are not Enough: Generating Adversarial Examples with Spatial Distortions.He Zhao; Trung Le; Paul Montague; Vel Olivier De; Tamas Abraham; Dinh Phung BUZz: BUffer Zones for defending adversarial examples in image classification.Phuong Ha Nguyen; Kaleel Mahmood; Lam M. Nguyen; Thanh Nguyen; Dijk Marten van 2019-10-02 Attacking Vision-based Perception in End-to-End Autonomous Driving Models.Adith Boloor; Karthik Garimella; Xin He; Christopher Gill; Yevgeniy Vorobeychik; Xuan Zhang Adversarially Robust Few-Shot Learning: A Meta-Learning Approach.Micah Goldblum; Liam Fowl; Tom Goldstein 2019-10-01 Boosting Image Recognition with Non-differentiable Constraints.Xuan Li; Yuchen Lu; Peng Xu; Jizong Peng; Christian Desrosiers; Xue Liu Generating Semantic Adversarial Examples with Differentiable Rendering.Lakshya Jain; Wilson Wu; Steven Chen; Uyeong Jang; Varun Chandrasekaran; Sanjit Seshia; Somesh Jha Attacking CNN-based anti-spoofing face authentication in the physical domain.Bowen Zhang; Benedetta Tondi; Mauro Barni An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack.Yang Zhang; Shiyu Chang; Mo Yu; Kaizhi Qian Deep Neural Rejection against Adversarial Examples.Angelo Sotgiu; Ambra Demontis; Marco Melis; Battista Biggio; Giorgio Fumera; Xiaoyi Feng; Fabio Roli Cross-Layer Strategic Ensemble Defense Against Adversarial Examples.Wenqi Wei; Ling Liu; Margaret Loper; Ka-Ho Chow; Emre Gursoy; Stacey Truex; Yanzhao Wu 2019-09-30 Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML.Sijia Liu; Songtao Lu; Xiangyi Chen; Yao Feng; Kaidi Xu; Abdullah Al-Dujaili; Minyi Hong; Una-May Obelilly Adversarial Patches Exploiting Contextual Reasoning in Object Detection.Aniruddha Saha; Akshayvarun Subramanya; Koninika Patil; Hamed Pirsiavash Black-box Adversarial Attacks with Bayesian Optimization.Satya Narayan Shukla; Anit Kumar Sahu; Devin Willmott; J. Zico Kolter 2019-09-29 Techniques for Adversarial Examples Threatening the Safety of Artificial Intelligence Based Systems.Utku Kose 2019-09-27 Maximal adversarial perturbations for obfuscation: Hiding certain attributes while preserving rest.Indu Ilanchezian; Praneeth Vepakomma; Abhishek Singh; Otkrist Gupta; G. N. Srinivasa Prasanna; Ramesh Raskar Impact of Low-bitwidth Quantization on the Adversarial Robustness for Embedded Neural Networks.Rémi Bernhard; Pierre-Alain Moellic; Jean-Max Dutertre 2019-09-26 Towards Understanding the Transferability of Deep Representations.Hong Liu; Mingsheng Long; Jianmin Wang; Michael I. Jordan Towards neural networks that provably know when they don't know.Alexander Meinke; Matthias Hein Adversarial Machine Learning Attack on Modulation Classification.Muhammad Usama; Muhammad Asim; Junaid Qadir; Ala Al-Fuqaha; Muhammad Ali Imran Adversarial ML Attack on Self Organizing Cellular Networks.Salah-ud-din Farooq; Muhammad Usama; Junaid Qadir; Muhammad Ali Imran Lower Bounds on Adversarial Robustness from Optimal Transport.Arjun Nitin Bhagoji; Daniel Cullina; Prateek Mittal 2019-09-25 Probabilistic Modeling of Deep Features for Out-of-Distribution and Adversarial Detection.Nilesh A. Ahuja; Ibrahima Ndiour; Trushant Kalyanpur; Omesh Tickoo Mixup Inference: Better Exploiting Mixup to Defend Adversarial Attacks.Tianyu Pang; Kun Xu; Jun Zhu FreeLB: Enhanced Adversarial Training for Language Understanding.Chen Zhu; Yu Cheng; Zhe Gan; Siqi Sun; Tom Goldstein; Jingjing Liu 2019-09-24 A Visual Analytics Framework for Adversarial Text Generation.Brandon Laughlin; Christopher Collins; Karthik Sankaranarayanan; Khalil El-Khatib Intelligent image synthesis to attack a segmentation CNN using adversarial learning.Liang Chen; Paul Bentley; Kensaku Mori; Kazunari Misawa; Michitaka Fujiwara; Daniel Rueckert Sign-OPT: A Query-Efficient Hard-label Adversarial Attack.Minhao Cheng; Simranjit Singh; Patrick Chen; Pin-Yu Chen; Sijia Liu; Cho-Jui Hsieh 2019-09-23 Adversarial Examples for Deep Learning Cyber Security Analytics.Alesia Chernikova; Alina Oprea Robust Local Features for Improving the Generalization of Adversarial Training.Chubiao Song; Kun He; Jiadong Lin; Liwei Wang; John E. Hopcroft MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.Jinyuan Jia; Ahmed Salem; Michael Backes; Yang Zhang; Neil Zhenqiang Gong 2019-09-22 HAWKEYE: Adversarial Example Detector for Deep Neural Networks.Jinkyu Koo; Michael Roth; Saurabh Bagchi 2019-09-20 Adversarial Learning with Margin-based Triplet Embedding Regularization.Yaoyao Zhong; Weihong Deng Defending Against Physically Realizable Attacks on Image Classification.Tong Wu; Liang Tong; Yevgeniy Vorobeychik COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection.Aminollah Khormali; Ahmed Abusnaina; Songqing Chen; DaeHun Nyang; Aziz Mohaisen 2019-09-19 Propagated Perturbation of Adversarial Attack for well-known CNNs: Empirical Study and its Explanation.Jihyeun Yoon; Kyungyul Kim; Jongseong Jang Adversarial Vulnerability Bounds for Gaussian Process Classification.Michael Thomas Smith; Kathrin Grosse; Michael Backes; Mauricio A Alvarez Absum: Simple Regularization Method for Reducing Structural Sensitivity of Convolutional Neural Networks.Sekitoshi Kanai; Yasutoshi Ida; Yasuhiro Fujiwara; Masanori Yamada; Shuichi Adachi Training Robust Deep Neural Networks via Adversarial Noise Propagation.Aishan Liu; Xianglong Liu; Chongzhi Zhang; Hang Yu; Qiang Liu; Junfeng He Toward Robust Image Classification.Basemah Alshemali; Alta Graham; Jugal Kalita 2019-09-17 Adversarial Attacks and Defenses in Images, Graphs and Text: A Review.Han Xu; Yao Ma; Haochen Liu; Debayan Deb; Hui Liu; Jiliang Tang; Anil Jain Generating Black-Box Adversarial Examples for Text Classifiers Using a Deep Reinforced Model.Prashanth Vijayaraghavan; Deb Roy Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges.Jinyuan Jia; Neil Zhenqiang Gong 2019-09-16 HAD-GAN: A Human-perception Auxiliary Defense GAN model to Defend Adversarial Examples.Wanting Yu; Hongyi Yu; Lingyun Jiang; Mengli Zhang; Kai Qiao; Linyuan Wang; Bin Yan They Might NOT Be Giants: Crafting Black-Box Adversarial Examples with Fewer Queries Using Particle Swarm Optimization.Rayan Mosli; Matthew Wright; Bo Yuan; Yin Pan Towards Quality Assurance of Software Product Lines with Adversarial Configurations.Paul Temple; Mathieu Acher; Gilles Perrouin; Battista Biggio; Jean-marc Jezequel; Fabio Roli Interpreting and Improving Adversarial Robustness with Neuron Sensitivity.Chongzhi Zhang; Aishan Liu; Xianglong Liu; Yitao Xu; Hang Yu; Yuqing Ma; Tianlin Li 2019-09-15 An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms.Qianyu Guo; Sen Chen; Xiaofei Xie; Lei Ma; Qiang Hu; Hongtao Liu; Yang Liu; Jianjun Zhao; Xiaohong Li Detecting Adversarial Samples Using Influence Functions and Nearest Neighbors.Gilad Cohen; Guillermo Sapiro; Raja Giryes 2019-09-14 Natural Language Adversarial Attacks and Defenses in Word Level.Xiaosen Wang; Hao Jin; Kun He 2019-09-13 Adversarial Attack on Skeleton-based Human Action Recognition.Jian Liu; Naveed Akhtar; Ajmal Mian Say What I Want: Towards the Dark Side of Neural Dialogue Models.Haochen Liu; Tyler Derr; Zitao Liu; Jiliang Tang White-Box Adversarial Defense via Self-Supervised Data Estimation.Zudi Lin; Hanspeter Pfister; Ziming Zhang Defending Against Adversarial Attacks by Suppressing the Largest Eigenvalue of Fisher Information Matrix.Chaomin Shen; Yaxin Peng; Guixu Zhang; Jinsong Fan 2019-09-12 Inspecting adversarial examples using the Fisher information.Jörg Martin; Clemens Elster An Empirical Investigation of Randomized Defenses against Adversarial Attacks.Yannik Potdevin; Dirk Nowotka; Vijay Ganesh Transferable Adversarial Robustness using Adversarially Trained Autoencoders.Pratik Vaishnavi; Kevin Eykholt; Atul Prakash; Amir Rahmati 2019-09-11 Feedback Learning for Improving the Robustness of Neural Networks.Chang Song; Zuoguan Wang; Hai Li Sparse and Imperceivable Adversarial Attacks.Francesco Croce; Matthias Hein 2019-09-10 Localized Adversarial Training for Increased Accuracy and Robustness in Image Classification.Eitan Rothberg; Tingting Chen; Luo Jie; Hao Ji Identifying and Resisting Adversarial Videos Using Temporal Consistency.Xiaojun Jia; Xingxing Wei; Xiaochun Cao Effectiveness of Adversarial Examples and Defenses for Malware Classification.Robert Podschwadt; Hassan Takabi Towards Noise-Robust Neural Networks via Progressive Adversarial Training.Hang Yu; Aishan Liu; Xianglong Liu; Jichen Yang; Chongzhi Zhang UPC: Learning Universal Physical Camouflage Attacks on Object Detectors.Lifeng Huang; Chengying Gao; Yuyin Zhou; Changqing Zou; Cihang Xie; Alan Yuille; Ning Liu FDA: Feature Disruptive Attack.Aditya Ganeshan; B. S. Vivek; R. Venkatesh Babu Learning to Disentangle Robust and Vulnerable Features for Adversarial Detection.Byunggill Joe; Sung Ju Hwang; Insik Shin Toward Finding The Global Optimal of Adversarial Examples.Zhenxin Xiao; Kai-Wei Chang; Cho-Jui Hsieh 2019-09-09 Adversarial Robustness Against the Union of Multiple Perturbation Models.Pratyush Maini; Eric Wong; J. Zico Kolter 2019-09-08 STA: Adversarial Attacks on Siamese Trackers.Xugang Wu; Xiaoping Wang; Xu Zhou; Songlei Jian When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures.Gil Fidel; Ron Bitton; Asaf Shabtai 2019-09-06 Learning to Discriminate Perturbations for Blocking Adversarial Attacks in Text Classification.Yichao Zhou; Jyun-Yu Jiang; Kai-Wei Chang; Wei Wang Natural Adversarial Sentence Generation with Gradient-based Perturbation.Yu-Lun Hsieh; Minhao Cheng; Da-Cheng Juan; Wei Wei; Wen-Lian Hsu; Cho-Jui Hsieh Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information.Yiren Zhao; Ilia Shumailov; Han Cui; Xitong Gao; Robert Mullins; Ross Anderson 2019-09-05 Spatiotemporally Constrained Action Space Attacks on Deep Reinforcement Learning Agents.Xian Yeow Lee; Sambit Ghadai; Kai Liang Tan; Chinmay Hegde; Soumik Sarkar Adversarial Examples with Difficult Common Words for Paraphrase Identification.Zhouxing Shi; Minlie Huang; Ting Yao; Jingfang Xu 2019-09-04 Are Adversarial Robustness and Common Perturbation Robustness Independent Attributes ?.Alfred Laugros; Alice Caplier; Matthieu Ospici 2019-09-03 Certified Robustness to Adversarial Word Substitutions.Robin Jia; Aditi Raghunathan; Kerem Göksel; Percy Liang Achieving Verified Robustness to Symbol Substitutions via Interval Bound Propagation.Po-Sen Huang; Robert Stanforth; Johannes Welbl; Chris Dyer; Dani Yogatama; Sven Gowal; Krishnamurthy Dvijotham; Pushmeet Kohli 2019-09-02 Metric Learning for Adversarial Robustness.Chengzhi Mao; Ziyuan Zhong; Junfeng Yang; Carl Vondrick; Baishakhi Ray 2019-08-29 Adversarial Training Methods for Network Embedding.Quanyu Dai; Xiao Shen; Liang Zhang; Qiang Li; Dan Wang Deep Neural Network Ensembles against Deception: Ensemble Diversity, Accuracy and Robustness.Ling Liu; Wenqi Wei; Ka-Ho Chow; Margaret Loper; Emre Gursoy; Stacey Truex; Yanzhao Wu Defending Against Misclassification Attacks in Transfer Learning.Bang Wu; Xiangwen Yang; Shuo Wang; Xingliang Yuan; Cong Wang; Carsten Rudolph Universal, transferable and targeted adversarial attacks.Junde Wu; Rao Fu 2019-08-26 A Statistical Defense Approach for Detecting Adversarial Examples.Alessandro Cennamo; Ido Freeman; Anton Kummert 2019-08-25 Adversarial Edit Attacks for Tree Data.Benjamin Paaßen advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable Patterns.Zhibo Wang; Siyan Zheng; Mengkai Song; Qian Wang; Alireza Rahimpour; Hairong Qi 2019-08-24 Targeted Mismatch Adversarial Attack: Query with a Flower to Retrieve the Tower.Giorgos Tolias; Filip Radenovic; Ond{ř}ej Chum 2019-08-23 Improving Adversarial Robustness via Attention and Adversarial Logit Pairing.Dou Goodman; Xingjian Li; Jun Huan; Tao Wei AdvHat: Real-world adversarial attack on ArcFace Face ID system.Stepan Komkov; Aleksandr Petiushko 2019-08-22 Saliency Methods for Explaining Adversarial Attacks.Jindong Gu; Volker Tresp 2019-08-21 Testing Robustness Against Unforeseen Adversaries.Daniel Kang; Yi Sun; Dan Hendrycks; Tom Brown; Jacob Steinhardt Evaluating Defensive Distillation For Defending Text Processing Neural Networks Against Adversarial Examples.Marcus Soll; Tobias Hinz; Sven Magg; Stefan Wermter 2019-08-20 Robust Graph Neural Network Against Poisoning Attacks via Transfer Learning.Xianfeng Tang; Yandong Li; Yiwei Sun; Huaxiu Yao; Prasenjit Mitra; Suhang Wang Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks.Ka-Ho Chow; Wenqi Wei; Yanzhao Wu; Ling Liu 2019-08-19 Universal Adversarial Triggers for NLP.Eric Wallace; Shi Feng; Nikhil Kandpal; Matt Gardner; Sameer Singh Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries.Fnu Suya; Jianfeng Chi; David Evans; Yuan Tian Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses.Xiao Wang; Siyue Wang; Pin-Yu Chen; Yanzhi Wang; Brian Kulis; Xue Lin; Peter Chin 2019-08-18 On the Robustness of Human Pose Estimation.Sahil Shah; Naman jain; Abhishek Sharma; Arjun Jain Adversarial Defense by Suppressing High-frequency Components.Zhendong Zhang; Cheolkon Jung; Xiaolong Liang 2019-08-17 Verification of Neural Network Control Policy Under Persistent Adversarial Perturbation.Yuh-Shyang Wang; Tsui-Wei Weng; Luca Daniel Nesterov Accelerated Gradient and Scale Invariance for Improving Transferability of Adversarial Examples.Jiadong Lin; Chuanbiao Song; Kun He; Liwei Wang; John E. Hopcroft 2019-08-16 Adversarial point perturbations on 3D objects.Daniel Liu; Ronald Yu; Hao Su 2019-08-14 DAPAS : Denoising Autoencoder to Prevent Adversarial attack in Semantic Segmentation.Seung Ju Cho; Tae Joon Jun; Byungsoo Oh; Daeyoung Kim Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once.Jiangfan Han; Xiaoyi Dong; Ruimao Zhang; Dongdong Chen; Weiming Zhang; Nenghai Yu; Ping Luo; Xiaogang Wang AdvFaces: Adversarial Face Synthesis.Debayan Deb; Jianbang Zhang; Anil K. Jain 2019-08-12 On Defending Against Label Flipping Attacks on Malware Detection Systems.Rahim Taheri; Reza Javidan; Mohammad Shojafar; Zahra Pooranian; Ali Miri; Mauro Conti Adversarial Neural Pruning.Divyam Madaan; Sung Ju Hwang 2019-08-09 On the Adversarial Robustness of Neural Networks without Weight Transport.Mohamed Akrout 2019-08-08 Defending Against Adversarial Iris Examples Using Wavelet Decomposition.Sobhan Soleymani; Ali Dabouei; Jeremy Dawson; Nasser M. Nasrabadi Universal Adversarial Audio Perturbations.Sajjad Abdoli; Luiz G. Hafemann; Jerome Rony; Ismail Ben Ayed; Patrick Cardinal; Alessandro L. Koerich 2019-08-07 Improved Adversarial Robustness by Reducing Open Space Risk via Tent Activations.Andras Rozsa; Terrance E. Boult Investigating Decision Boundaries of Trained Neural Networks.Roozbeh Yousefzadeh; Dianne P O'Leary 2019-08-06 Explaining Deep Neural Networks Using Spectrum-Based Fault Localization.Youcheng Sun; Hana Chockler; Xiaowei Huang; Daniel Kroening MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks.Chen Ma; Chenxu Zhao; Hailin Shi; Li Chen; Junhai Yong; Dan Zeng BlurNet: Defense by Filtering the Feature Maps.Ravi Raju; Mikko Lipasti 2019-08-05 Random Directional Attack for Fooling Deep Neural Networks.Wenjian Luo; Chenwang Wu; Nan Zhou; Li Ni Adversarial Self-Defense for Cycle-Consistent GANs.Dina Bashkirova; Ben Usman; Kate Saenko Automated Detection System for Adversarial Examples with High-Frequency Noises Sieve.Dang Duy Thang; Toshihiro Matsui A principled approach for generating adversarial images under non-smooth dissimilarity metrics.Aram-Alexandre Pooladian; Chris Finlay; Tim Hoheisel; Adam Oberman Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems.Lea Schönherr; Steffen Zeiler; Thorsten Holz; Dorothea Kolossa 2019-08-04 A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding Models.Heng Chang; Yu Rong; Tingyang Xu; Wenbing Huang; Honglei Zhang; Peng Cui; Wenwu Zhu; Junzhou Huang 2019-08-03 Exploring the Robustness of NMT Systems to Nonsensical Inputs.Akshay Chaturvedi; Abijith KP; Utpal Garain 2019-08-02 AdvGAN++ : Harnessing latent layers for adversary generation.Puneet Mangla; Surgan Jandial; Sakshi Varshney; Vineeth N Balasubramanian 2019-08-01 Black-box Adversarial ML Attack on Modulation Classification.Muhammad Usama; Junaid Qadir; Ala Al-Fuqaha Robustifying deep networks for image segmentation.Zheng Liu; Jinnian Zhang; Varun Jog; Po-Ling Loh; Alan B McMillan 2019-07-31 Adversarial Robustness Curves.Christina Göpfert; Jan Philip Göpfert; Barbara Hammer Optimal Attacks on Reinforcement Learning Policies.Alessio Russo; Alexandre Proutiere 2019-07-30 Impact of Adversarial Examples on Deep Learning Models for Biomedical Image Segmentation.Utku Ozbulak; Messem Arnout Van; Neve Wesley De Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding.Utku Ozbulak; Messem Arnout Van; Neve Wesley De 2019-07-28 Are Odds Really Odd? Bypassing Statistical Detection of Adversarial Examples.Hossein Hosseini; Sreeram Kannan; Radha Poovendran 2019-07-27 Is BERT Really Robust? A Strong Baseline for Natural Language Attack on Text Classification and Entailment.Di Jin; Zhijing Jin; Joey Tianyi Zhou; Peter Szolovits 2019-07-26 Understanding Adversarial Robustness: The Trade-off between Minimum and Average Margin.Kaiwen Wu; Yaoliang Yu On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method.Pu Zhao; Sijia Liu; Pin-Yu Chen; Nghia Hoang; Kaidi Xu; Bhavya Kailkhura; Xue Lin 2019-07-24 Towards Adversarially Robust Object Detection.Haichao Zhang; Jianyu Wang Understanding Adversarial Attacks on Deep Learning Based Medical Image Analysis Systems.Xingjun Ma; Yuhao Niu; Lin Gu; Yisen Wang; Yitian Zhao; James Bailey; Feng Lu Joint Adversarial Training: Incorporating both Spatial and Pixel Attacks.Haichao Zhang; Jianyu Wang Defense Against Adversarial Attacks Using Feature Scattering-based Adversarial Training.Haichao Zhang; Jianyu Wang Weakly Supervised Localization using Min-Max Entropy: an Interpretable Framework.Soufiane Belharbi; Jérôme Rony; Jose Dolz; Ismail Ben Ayed; Luke McCaffrey; Eric Granger 2019-07-23 Enhancing Adversarial Example Transferability with an Intermediate Level Attack.Qian Huang; Isay Katsman; Horace He; Zeqi Gu; Serge Belongie; Ser-Nam Lim 2019-07-21 Characterizing Attacks on Deep Reinforcement Learning.Chaowei Xiao; Xinlei Pan; Warren He; Jian Peng; Mingjie Sun; Jinfeng Yi; Bo Li; Dawn Song 2019-07-17 Connecting Lyapunov Control Theory to Adversarial Attacks.Arash Rahnama; Andre T. Nguyen; Edward Raff Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems.Alessandro Erba; Riccardo Taormina; Stefano Galelli; Marcello Pogliani; Michele Carminati; Stefano Zanero; Nils Ole Tippenhauer Robustness properties of Facebook's ResNeXt WSL models.A. Emin Orhan 2019-07-16 Adversarial Security Attacks and Perturbations on Machine Learning and Deep Learning Methods.Arif Siddiqi Natural Adversarial Examples.Dan Hendrycks; Kevin Zhao; Steven Basart; Jacob Steinhardt; Dawn Song Latent Adversarial Defence with Boundary-guided Generation.Xiaowei Zhou; Ivor W. Tsang; Jie Yin Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving.Yulong Cao; Chaowei Xiao; Benjamin Cyr; Yimeng Zhou; Won Park; Sara Rampazzi; Qi Alfred Chen; Kevin Fu; Z. Morley Mao Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics.Yuxin Ma; Tiankai Xie; Jundong Li; Ross Maciejewski 2019-07-15 Graph Interpolating Activation Improves Both Natural and Robust Accuracies in Data-Efficient Deep Learning.Bao Wang; Stanley J. Osher Recovery Guarantees for Compressible Signals with Adversarial Noise.Jasjeet Dhaliwal; Kyle Hambrook 2019-07-14 Measuring the Transferability of Adversarial Examples.Deyan Petrov; Timothy M. Hospedales 2019-07-12 Unsupervised Adversarial Attacks on Deep Feature-based Retrieval with GAN.Guoping Zhao; Mingyu Zhang; Jiajun Liu; Ji-Rong Wen Stateful Detection of Black-Box Adversarial Attacks.Steven Chen; Nicholas Carlini; David Wagner Generative Modeling by Estimating Gradients of the Data Distribution.Yang Song; Stefano Ermon 2019-07-11 Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn.Ziv Katzir; Yuval Elovici Adversarial Objects Against LiDAR-Based Autonomous Driving Systems.Yulong Cao; Chaowei Xiao; Dawei Yang; Jing Fang; Ruigang Yang; Mingyan Liu; Bo Li 2019-07-10 Metamorphic Detection of Adversarial Examples in Deep Learning Models With Affine Transformations.Rohan Reddy Mekala; Gudjon Einar Magnusson; Adam Porter; Mikael Lindvall; Madeline Diep 2019-07-09 Generating Adversarial Fragments with Adversarial Networks for Physical-world Implementation.Zelun Kong; Cong Liu 2019-07-06 Affine Disentangled GAN for Interpretable and Robust AV Perception.Letao Liu; Martin Saerbeck; Justin Dauwels 2019-07-05 Detecting and Diagnosing Adversarial Images with Class-Conditional Capsule Reconstructions.Yao Qin; Nicholas Frosst; Sara Sabour; Colin Raffel; Garrison Cottrell; Geoffrey Hinton 2019-07-04 Adversarial Robustness through Local Linearization.Chongli Qin; James Martens; Sven Gowal; Dilip Krishnan; Krishnamurthy Dvijotham; Alhussein Fawzi; Soham De; Robert Stanforth; Pushmeet Kohli Adversarial Attacks in Sound Event Classification.Vinod Subramanian; Emmanouil Benetos; Ning Xu; SKoT McDonald; Mark Sandler 2019-07-03 Robust Synthesis of Adversarial Visual Examples Using a Deep Image Prior.Thomas Gittings; Steve Schneider; John Collomosse Minimally distorted Adversarial Examples with a Fast Adaptive Boundary Attack.Francesco Croce; Matthias Hein 2019-07-02 Efficient Cyber Attacks Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA.Moshe Kravchik; Asaf Shabtai Treant: Training Evasion-Aware Decision Trees.Stefano Calzavara; Claudio Lucchese; Gabriele Tolomei; Seyum Assefa Abebe; Salvatore Orlando 2019-07-01 Comment on "Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network".Roland S. Zimmermann Diminishing the Effect of Adversarial Perturbations via Refining Feature Representation.Nader Asadi; AmirMohammad Sarfi; Sahba Tahsini; Mahdi Eftekhari Accurate, reliable and fast robustness evaluation.Wieland Brendel; Jonas Rauber; Matthias Kümmerer; Ivan Ustyuzhaninov; Matthias Bethge 2019-06-30 Fooling a Real Car with Adversarial Traffic Signs.Nir Morgulis; Alexander Kreines; Shachar Mendelowitz; Yuval Weisglass 2019-06-28 Using Self-Supervised Learning Can Improve Model Robustness and Uncertainty.Dan Hendrycks; Mantas Mazeika; Saurav Kadavath; Dawn Song Certifiable Robustness and Robust Training for Graph Convolutional Networks.Daniel Zügner; Stephan Günnemann Learning to Cope with Adversarial Attacks.Xian Yeow Lee; Aaron Havens; Girish Chowdhary; Soumik Sarkar Robustness Guarantees for Deep Neural Networks on Videos.Min Wu; Marta Kwiatkowska 2019-06-27 Using Intuition from Empirical Properties to Simplify Adversarial Training Defense.Guanxiong Liu; Issa Khalil; Abdallah Khreishah Evolving Robust Neural Architectures to Defend from Adversarial Attacks.Danilo Vasconcellos Vargas; Shashank Kotyan Adversarial Robustness via Label-Smoothing.Morgane Goibert; Elvis Dohmatob 2019-06-26 The Adversarial Robustness of Sampling.Omri Ben-Eliezer; Eylon Yogev Defending Adversarial Attacks by Correcting logits.Yifeng Li; Lingxi Xie; Ya Zhang; Rui Zhang; Yanfeng Wang; Qi Tian 2019-06-25 Quantitative Verification of Neural Networks And its Security Applications.Teodora Baluta; Shiqi Shen; Shweta Shinde; Kuldeep S. Meel; Prateek Saxena Are Adversarial Perturbations a Showstopper for ML-Based CAD? A Case Study on CNN-Based Lithographic Hotspot Detection.Kang Liu; Haoyu Yang; Yuzhe Ma; Benjamin Tan; Bei Yu; Evangeline F. Y. Young; Ramesh Karri; Siddharth Garg 2019-06-24 Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals.Yunhan Huang; Quanyan Zhu 2019-06-22 Defending Against Adversarial Examples with K-Nearest Neighbor.Chawin Sitawarin; David Wagner 2019-06-21 Hiding Faces in Plain Sight: Disrupting AI Face Synthesis with Adversarial Perturbations.Yuezun Li; Xin Yang; Baoyuan Wu; Siwei Lyu A Fourier Perspective on Model Robustness in Computer Vision.Dong Yin; Raphael Gontijo Lopes; Jonathon Shlens; Ekin D. Cubuk; Justin Gilmer Evolution Attack On Neural Networks.YiGui Luo; RuiJia Yang; Wei Sha; WeiYi Ding; YouTeng Sun; YiSi Wang Adversarial Examples to Fool Iris Recognition Systems.Sobhan Soleymani; Ali Dabouei; Jeremy Dawson; Nasser M. Nasrabadi 2019-06-20 On Physical Adversarial Patches for Object Detection.Mark Lee; Zico Kolter 2019-06-19 Catfish Effect Between Internal and External Attackers:Being Semi-honest is Helpful.Hanqing Liu; Na Ruan; Joseph K. Liu Improving the robustness of ImageNet classifiers using elements of human visual cognition.A. Emin Orhan; Brenden M. Lake A unified view on differential privacy and robustness to adversarial examples.Rafael Pinot; Florian Yger; Cédric Gouy-Pailler; Jamal Atif Convergence of Adversarial Training in Overparametrized Networks.Ruiqi Gao; Tianle Cai; Haochuan Li; Liwei Wang; Cho-Jui Hsieh; Jason D. Lee Global Adversarial Attacks for Assessing Deep Learning Robustness.Hanbin Hu; Mit Shah; Jianhua Z. Huang; Peng Li Cloud-based Image Classification Service Is Not Robust To Simple Transformations: A Forgotten Battlefield.Dou Goodman; Tao Wei SemanticAdv: Generating Adversarial Examples via Attribute-conditional Image Editing.Haonan Qiu; Chaowei Xiao; Lei Yang; Xinchen Yan; Honglak Lee; Bo Li 2019-06-17 Adversarial attacks on Copyright Detection Systems.Parsa Saadatpanah; Ali Shafahi; Tom Goldstein Improving Black-box Adversarial Attacks with a Transfer-based Prior.Shuyu Cheng; Yinpeng Dong; Tianyu Pang; Hang Su; Jun Zhu The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks.Felix Assion; Peter Schlicht; Florens Greßner; Wiebke Günther; Fabian Hüger; Nico Schmidt; Umair Rasheed 2019-06-16 Interpolated Adversarial Training: Achieving Robust Neural Networks without Sacrificing Accuracy.Alex Lamb; Vikas Verma; Juho Kannala; Yoshua Bengio Defending Against Adversarial Attacks Using Random Forests.Yifan Ding; Liqiang Wang; Huan Zhang; Jinfeng Yi; Deliang Fan; Boqing Gong 2019-06-15 Uncovering Why Deep Neural Networks Lack Robustness: Representation Metrics that Link to Adversarial Attacks.Danilo Vasconcellos Vargas; Shashank Kotyan; Moe Matsuki 2019-06-14 Adversarial Training Can Hurt Generalization.Aditi Raghunathan; Sang Michael Xie; Fanny Yang; John C. Duchi; Percy Liang Towards Compact and Robust Deep Neural Networks.Vikash Sehwag; Shiqi Wang; Prateek Mittal; Suman Jana Perceptual Based Adversarial Audio Attacks.Joseph Szurley; J. Zico Kolter Copy and Paste: A Simple But Effective Initialization Method for Black-Box Adversarial Attacks.Thomas Brunner; Frederik Diehl; Alois Knoll Robust or Private? Adversarial Training Makes Models More Vulnerable to Privacy Attacks.Felipe A. Mejia; Paul Gamble; Zigfried Hampel-Arias; Michael Lomnitz; Nina Lopatina; Lucas Tindall; Maria Alejandra Barrios Towards Stable and Efficient Training of Verifiably Robust Neural Networks.Huan Zhang; Hongge Chen; Chaowei Xiao; Bo Li; Duane Boning; Cho-Jui Hsieh Model Agnostic Dual Quality Assessment for Adversarial Machine Learning and an Analysis of Current Neural Networks and Defenses.Danilo Vasconcellos Vargas; Shashank Kotyan 2019-06-13 A Computationally Efficient Method for Defending Adversarial Deep Learning Attacks.Rajeev Sahay; Rehana Mahfuz; Aly El Gamal Lower Bounds for Adversarially Robust PAC Learning.Dimitrios I. Diochnos; Saeed Mahloujifar; Mohammad Mahmoody 2019-06-12 Tight Certificates of Adversarial Robustness for Randomly Smoothed Classifiers.Guang-He Lee; Yang Yuan; Shiyu Chang; Tommi S. Jaakkola 2019-06-11 Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks.Ziang Yan; Yiwen Guo; Changshui Zhang Mimic and Fool: A Task Agnostic Adversarial Attack.Akshay Chaturvedi; Utpal Garain Efficient and Accurate Estimation of Lipschitz Constants for Deep Neural Networks.Mahyar Fazlyab; Alexander Robey; Hamed Hassani; Manfred Morari; George J. Pappas 2019-06-10 E-LPIPS: Robust Perceptual Image Similarity via Random Transformation Ensembles.Markus Kettunen; Erik Härkönen; Jaakko Lehtinen Evaluating the Robustness of Nearest Neighbor Classifiers: A Primal-Dual Perspective.Lu Wang; Xuanqing Liu; Jinfeng Yi; Zhi-Hua Zhou; Cho-Jui Hsieh Robustness Verification of Tree-based Models.Hongge Chen; Huan Zhang; Si Si; Yang Li; Duane Boning; Cho-Jui Hsieh Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective.Kaidi Xu; Hongge Chen; Sijia Liu; Pin-Yu Chen; Tsui-Wei Weng; Mingyi Hong; Xue Lin 2019-06-09 On the Vulnerability of Capsule Networks to Adversarial Attacks.Felix Michels; Tobias Uelwer; Eric Upschulte; Stefan Harmeling Intriguing properties of adversarial training.Cihang Xie; Alan Yuille Improved Adversarial Robustness via Logit Regularization Methods.Cecilia Summers; Michael J. Dinneen Attacking Graph Convolutional Networks via Rewiring.Yao Ma; Suhang Wang; Tyler Derr; Lingfei Wu; Jiliang Tang Towards A Unified Min-Max Framework for Adversarial Exploration and Robustness.Jingkang Wang; Tianyun Zhang; Sijia Liu; Pin-Yu Chen; Jiacen Xu; Makan Fardad; Bo Li Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers.Hadi Salman; Greg Yang; Jerry Li; Pengchuan Zhang; Huan Zhang; Ilya Razenshteyn; Sebastien Bubeck 2019-06-08 Strategies to architect AI Safety: Defense to guard AI from Adversaries.Rajagopal. A; Nirmala. V Making targeted black-box evasion attacks effective and efficient.Mika Juuti; Buse Gul Atli; N. Asokan Sensitivity of Deep Convolutional Networks to Gabor Noise.Kenneth T. Co; Luis Muñoz-González; Emil C. Lupu ML-LOO: Detecting Adversarial Examples with Feature Attribution.Puyudi Yang; Jianbo Chen; Cho-Jui Hsieh; Jane-Ling Wang; Michael I. Jordan Defending against Adversarial Attacks through Resilient Feature Regeneration.Tejas Borkar; Felix Heide; Lina Karam Provably Robust Boosted Decision Stumps and Trees against Adversarial Attacks.Maksym Andriushchenko; Matthias Hein 2019-06-07 A cryptographic approach to black box adversarial machine learning.Kevin Shi; Daniel Hsu; Allison Bishop Using learned optimizers to make models robust to input noise.Luke Metz; Niru Maheswaranathan; Jonathon Shlens; Jascha Sohl-Dickstein; Ekin D. Cubuk Adversarial Examples for Non-Parametric Methods: Attacks, Defenses and Large Sample Limits.Yao-Yuan Yang; Cyrus Rashtchian; Yizhen Wang; Kamalika Chaudhuri Efficient Project Gradient Descent for Ensemble Adversarial Attack.Fanyou Wu; Rado Gazo; Eva Haviarova; Bedrich Benes Inductive Bias of Gradient Descent based Adversarial Training on Separable Data.Yan Li; Ethan X. Fang; Huan Xu; Tuo Zhao Adversarial Explanations for Understanding Image Classification Decisions and Improved Neural Network Robustness.Walt Woods; Jack Chen; Christof Teuscher 2019-06-06 Robust Attacks against Multiple Classifiers.Juan C. Perdomo; Yaron Singer Improving Robustness Without Sacrificing Accuracy with Patch Gaussian Augmentation.Raphael Gontijo Lopes; Dong Yin; Ben Poole; Justin Gilmer; Ekin D. Cubuk Understanding Adversarial Behavior of DNNs by Disentangling Non-Robust and Robust Components in Performance Metric.Yujun Shi; Benben Liao; Guangyong Chen; Yun Liu; Ming-Ming Cheng; Jiashi Feng Should Adversarial Attacks Use Pixel p-Norm?.Ayon Sen; Xiaojin Zhu; Liam Marshall; Robert Nowak Image Synthesis with a Single (Robust) Classifier.Shibani Santurkar; Dimitris Tsipras; Brandon Tran; Andrew Ilyas; Logan Engstrom; Aleksander Madry 2019-06-05 Query-efficient Meta Attack to Deep Neural Networks.Jiawei Du; Hu Zhang; Joey Tianyi Zhou; Yi Yang; Jiashi Feng MNIST-C: A Robustness Benchmark for Computer Vision.Norman Mu; Justin Gilmer Enhancing Gradient-based Attacks with Symbolic Intervals.Shiqi Wang; Yizheng Chen; Ahmed Abdou; Suman Jana Multi-way Encoding for Robustness.Donghyun Kim; Sarah Adel Bargal; Jianming Zhang; Stan Sclaroff 2019-06-04 Adversarial Training Generalizes Data-dependent Spectral Norm Regularization.Kevin Roth; Yannic Kilcher; Thomas Hofmann 2019-06-03 Conditional Generative Models are not Robust.Ethan Fetaya; Jörn-Henrik Jacobsen; Richard Zemel Adversarial Exploitation of Policy Imitation.Vahid Behzadan; William Hsu RL-Based Method for Benchmarking the Adversarial Resilience and Robustness of Deep Reinforcement Learning Policies.Vahid Behzadan; William Hsu Adversarial Risk Bounds for Neural Networks through Sparsity based Compression.Emilio Rafael Balda; Arash Behboodi; Niklas Koep; Rudolf Mathar The Adversarial Machine Learning Conundrum: Can The Insecurity of ML Become The Achilles' Heel of Cognitive Networks?.Muhammad Usama; Junaid Qadir; Ala Al-Fuqaha; Mounir Hamdi Adversarial Robustness as a Prior for Learned Representations.Logan Engstrom; Andrew Ilyas; Shibani Santurkar; Dimitris Tsipras; Brandon Tran; Aleksander Madry Achieving Generalizable Robustness of Deep Neural Networks by Stability Training.Jan Laermann; Wojciech Samek; Nils Strodthoff A Surprising Density of Illusionable Natural Speech.Melody Y. Guan; Gregory Valiant Fast and Stable Interval Bounds Propagation for Training Verifiably Robust Models.Paweł Morawiecki; Przemysław Spurek; Marek Śmieja; Jacek Tabor 2019-06-02 Adversarially Robust Generalization Just Requires More Unlabeled Data.Runtian Zhai; Tianle Cai; Di He; Chen Dan; Kun He; John Hopcroft; Liwei Wang 2019-06-01 Adversarial Examples for Edge Detection: They Exist, and They Transfer.Christian Cosgrove; Alan L. Yuille Enhancing Transformation-based Defenses using a Distribution Classifier.Connie Kou; Hwee Kuan Lee; Teck Khim Ng; Ee-Chien Chang Perceptual Evaluation of Adversarial Attacks for CNN-based Image Classification.Sid Ahmed Fezza; Yassine Bakhti; Wassim Hamidouche; Olivier Déforges 2019-05-31 Reverse KL-Divergence Training of Prior Networks: Improved Uncertainty and Adversarial Robustness.Andrey Malinin; Mark Gales Unlabeled Data Improves Adversarial Robustness.Yair Carmon; Aditi Raghunathan; Ludwig Schmidt; Percy Liang; John C. Duchi Are Labels Required for Improving Adversarial Robustness?.Jonathan Uesato; Jean-Baptiste Alayrac; Po-Sen Huang; Robert Stanforth; Alhussein Fawzi; Pushmeet Kohli 2019-05-30 Real-Time Adversarial Attacks.Yuan Gong; Boyang Li; Christian Poellabauer; Yiyu Shi Residual Networks as Nonlinear Systems: Stability Analysis using Linearization.Kai Rothauge; Zhewei Yao; Zixi Hu; Michael W. Mahoney Identifying Classes Susceptible to Adversarial Attacks.Rangeet Pan; Md Johirul Islam; Shibbir Ahmed; Hridesh Rajan Robust Sparse Regularization: Simultaneously Optimizing Neural Network Robustness and Compactness.Adnan Siraj Rakin; Zhezhi He; Li Yang; Yanzhi Wang; Liqiang Wang; Deliang Fan Interpretable Adversarial Training for Text.Samuel Barham; Soheil Feizi 2019-05-29 Bandlimiting Neural Networks Against Adversarial Attacks.Yuping Lin; Kasra Ahmadi K. A.; Hui Jiang Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and The Way Forward.Adnan Qayyum; Muhammad Usama; Junaid Qadir; Ala Al-Fuqaha Misleading Authorship Attribution of Source Code using Adversarial Learning.Erwin Quiring; Alwin Maier; Konrad Rieck Targeted Attacks on Deep Reinforcement Learning Agents through Adversarial Observations.Léonard Hussenot; Matthieu Geist; Olivier Pietquin Functional Adversarial Attacks.Cassidy Laidlaw; Soheil Feizi 2019-05-28 High Frequency Component Helps Explain the Generalization of Convolutional Neural Networks.Haohan Wang; Xindi Wu; Pengcheng Yin; Eric P. Xing ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation.Yuzhe Yang; Guo Zhang; Dina Katabi; Zhi Xu Snooping Attacks on Deep Reinforcement Learning.Matthew Inkawhich; Yiran Chen; Hai Li Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics.Yi Xiang Marcus Tan; Alfonso Iacovazzi; Ivan Homoliak; Yuval Elovici; Alexander Binder Improving the Robustness of Deep Neural Networks via Adversarial Training with Triplet Loss.Pengcheng Li; Jinfeng Yi; Bowen Zhou; Lijun Zhang Probabilistically True and Tight Bounds for Robust Deep Neural Network Training.Salman Alsubaihi; Adel Bibi; Modar Alfadly; Bernard Ghanem Empirically Measuring Concentration: Fundamental Limits on Intrinsic Robustness.Saeed Mahloujifar; Xiao Zhang; Mohammad Mahmoody; David Evans Cross-Domain Transferability of Adversarial Perturbations.Muzammal Naseer; Salman H. Khan; Harris Khan; Fahad Shahbaz Khan; Fatih Porikli Certifiably Robust Interpretation in Deep Learning.Alexander Levine; Sahil Singla; Soheil Feizi 2019-05-27 Brain-inspired reverse adversarial examples.Shaokai Ye; Sia Huat Tan; Kaidi Xu; Yanzhi Wang; Chenglong Bao; Kaisheng Ma Adversarially Robust Learning Could Leverage Computational Hardness.Sanjam Garg; Somesh Jha; Saeed Mahloujifar; Mohammad Mahmoody Label Universal Targeted Attack.Naveed Akhtar; Mohammad A. A. K. Jalwana; Mohammed Bennamoun; Ajmal Mian Divide-and-Conquer Adversarial Detection.Xuwang Yin; Soheil Kolouri; Gustavo K. Rohde Provable robustness against all adversarial $l_p$-perturbations for $p\geq 1$.Francesco Croce; Matthias Hein Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking.Yunhan Jia; Yantao Lu; Junjie Shen; Qi Alfred Chen; Zhenyu Zhong; Tao Wei Scaleable input gradient regularization for adversarial robustness.Chris Finlay; Adam M Oberman Combating Adversarial Misspellings with Robust Word Recognition.Danish Pruthi; Bhuwan Dhingra; Zachary C. Lipton Analyzing the Interpretability Robustness of Self-Explaining Models.Haizhong Zheng; Earlence Fernandes; Atul Prakash Unsupervised Euclidean Distance Attack on Network Embedding.Shanqing Yu; Jun Zheng; Jinhuan Wang; Jian Zhang; Lihong Chen; Qi Xuan; Jinyin Chen; Dan Zhang; Qingpeng Zhang 2019-05-26 State-Reification Networks: Improving Generalization by Modeling the Distribution of Hidden Representations.Alex Lamb; Jonathan Binas; Anirudh Goyal; Sandeep Subramanian; Ioannis Mitliagkas; Denis Kazakov; Yoshua Bengio; Michael C. Mozer Non-Determinism in Neural Networks for Adversarial Robustness.Daanish Ali Khan; Linhong Li; Ninghao Sha; Zhuoran Liu; Abelino Jimenez; Bhiksha Raj; Rita Singh Purifying Adversarial Perturbation with Adversarially Trained Auto-encoders.Hebi Li; Qi Xiao; Shixin Tian; Jin Tian Enhancing ML Robustness Using Physical-World Constraints.Varun Chandrasekaran; Brian Tang; Varsha Pendyala; Kassem Fawaz; Somesh Jha; Xi Wu Robust Classification using Robust Feature Augmentation.Kevin Eykholt; Swati Gupta; Atul Prakash; Amir Rahmati; Pratik Vaishnavi; Haizhong Zheng Generalizable Adversarial Attacks Using Generative Models.Avishek Joey Bose; Andre Cianflone; William L. Hamilton 2019-05-25 Trust but Verify: An Information-Theoretic Explanation for the Adversarial Fragility of Machine Learning Systems, and a General Defense against Adversarial Attacks.Jirong Yi; Hui Xie; Leixin Zhou; Xiaodong Wu; Weiyu Xu; Raghuraman Mudumbai Adversarial Distillation for Ordered Top-k Attacks.Zekun Zhang; Tianfu Wu Adversarial Policies: Attacking Deep Reinforcement Learning.Adam Gleave; Michael Dennis; Neel Kant; Cody Wild; Sergey Levine; Stuart Russell Rethinking Softmax Cross-Entropy Loss for Adversarial Robustness.Tianyu Pang; Kun Xu; Yinpeng Dong; Chao Du; Ning Chen; Jun Zhu 2019-05-24 Robustness to Adversarial Perturbations in Learning from Incomplete Data.Amir Najafi; Shin-ichi Maeda; Masanori Koyama; Takeru Miyato Power up! Robust Graph Convolutional Network against Evasion Attacks based on Graph Powering.Ming Jin; Heng Chang; Wenwu Zhu; Somayeh Sojoudi Enhancing Adversarial Defense by k-Winners-Take-All.Chang Xiao; Peilin Zhong; Changxi Zheng 2019-05-23 A Direct Approach to Robust Deep Learning Using Adversarial Networks.Huaxia Wang; Chun-Nam Yu PHom-GeM: Persistent Homology for Generative Models.Jeremy Charlier; Radu State; Jean Hilger Thwarting finite difference adversarial attacks with output randomization.Haidar Khan; Daniel Park; Azer Khan; Bülent Yener Interpreting Adversarially Trained Convolutional Neural Networks.Tianyuan Zhang; Zhanxing Zhu Adversarially Robust Distillation.Micah Goldblum; Liam Fowl; Soheil Feizi; Tom Goldstein 2019-05-22 Convergence and Margin of Adversarial Training on Separable Data.Zachary Charles; Shashank Rajput; Stephen Wright; Dimitris Papailiopoulos Detecting Adversarial Examples and Other Misclassifications in Neural Networks by Introspection.Jonathan Aigrain; Marcin Detyniecki 2019-05-21 DoPa: A Fast and Comprehensive CNN Defense Methodology against Physical Adversarial Attacks.Zirui Xu; Fuxun Yu; Xiang Chen 2019-05-20 Adversarially robust transfer learning.Ali Shafahi; Parsa Saadatpanah; Chen Zhu; Amin Ghiasi; Christoph Studer; David Jacobs; Tom Goldstein 2019-05-19 Testing Deep Neural Network based Image Classifiers.Yuchi Tian; Ziyuan Zhong; Vicente Ordonez; Baishakhi Ray 2019-05-18 What Do Adversarially Robust Models Look At?.Takahiro Itazuri; Yoshihiro Fukuhara; Hirokatsu Kataoka; Shigeo Morishima Taking Care of The Discretization Problem:A Black-Box Adversarial Image Attack in Discrete Integer Domain.Yuchao Duan; Zhe Zhao; Lei Bu; Fu Song 2019-05-17 POPQORN: Quantifying Robustness of Recurrent Neural Networks.Ching-Yun Ko; Zhaoyang Lyu; Tsui-Wei Weng; Luca Daniel; Ngai Wong; Dahua Lin A critique of the DeepSec Platform for Security Analysis of Deep Learning Models.Nicholas Carlini Simple Black-box Adversarial Attacks.Chuan Guo; Jacob R. Gardner; Yurong You; Andrew Gordon Wilson; Kilian Q. Weinberger 2019-05-16 Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization.Seungyong Moon; Gaon An; Hyun Oh Song 2019-05-15 War: Detecting adversarial examples by pre-processing input data.Hua Wang; Jie Wang; Zhaoxia Yin On Norm-Agnostic Robustness of Adversarial Training.Bai Li; Changyou Chen; Wenlin Wang; Lawrence Carin 2019-05-14 Robustification of deep net classifiers by key based diversified aggregation with pre-filtering.Olga Taran; Shideh Rezaeifar; Taras Holotyak; Slava Voloshynovskiy 2019-05-13 Adversarial Examples for Electrocardiograms.Xintian Han; Yuxuan Hu; Luca Foschini; Larry Chinitz; Lior Jankelson; Rajesh Ranganath Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks.Olakunle Ibitoye; Omair Shafiq; Ashraf Matrawy Harnessing the Vulnerability of Latent Layers in Adversarially Trained Models.Mayank Singh; Abhishek Sinha; Nupur Kumari; Harshitha Machiraju; Balaji Krishnamurthy; Vineeth N Balasubramanian 2019-05-11 Moving Target Defense for Deep Visual Sensing against Adversarial Examples.Qun Song; Zhenyu Yan; Rui Tan 2019-05-10 Interpreting and Evaluating Neural Network Robustness.Fuxun Yu; Zhuwei Qin; Chenchen Liu; Liang Zhao; Yanzhi Wang; Xiang Chen On the Connection Between Adversarial Robustness and Saliency Map Interpretability.Christian Etmann; Sebastian Lunz; Peter Maass; Carola-Bibiane Schönlieb Exact Adversarial Attack to Image Captioning via Structured Output Learning with Latent Variables.Yan Xu; Baoyuan Wu; Fumin Shen; Yanbo Fan; Yong Zhang; Heng Tao Shen; Wei Liu 2019-05-09 Adversarial Defense Framework for Graph Neural Network.Shen Wang; Zhengzhang Chen; Jingchao Ni; Xiao Yu; Zhichun Li; Haifeng Chen; Philip S. Yu Mitigating Deep Learning Vulnerabilities from Adversarial Examples Attack in the Cybersecurity Domain.Chris Einar San Agustin Exploring the Hyperparameter Landscape of Adversarial Robustness.Evelyn Duesterwald; Anupama Murthi; Ganesh Venkataraman; Mathieu Sinn; Deepak Vijaykeerthy Learning Interpretable Features via Adversarially Robust Optimization.Ashkan Khakzar; Shadi Albarqouni; Nassir Navab Universal Adversarial Perturbations for Speech Recognition Systems.Paarth Neekhara; Shehzeen Hussain; Prakhar Pandey; Shlomo Dubnov; Julian McAuley; Farinaz Koushanfar 2019-05-08 ROSA: Robust Salient Object Detection against Adversarial Attacks.Haofeng Li; Guanbin Li; Yizhou Yu Adversarial Image Translation: Unrestricted Adversarial Examples in Face Recognition Systems.Kazuya Kakizaki; Kosuke Yoshida Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction.Yunhan Jia; Yantao Lu; Senem Velipasalar; Zhenyu Zhong; Tao Wei 2019-05-07 A Comprehensive Analysis on Adversarial Robustness of Spiking Neural Networks.Saima Sharmin; Priyadarshini Panda; Syed Shakib Sarwar; Chankyu Lee; Wachirawit Ponghiran; Kaushik Roy Representation of White- and Black-Box Adversarial Examples in Deep Neural Networks and Humans: A Functional Magnetic Resonance Imaging Study.Chihye Han; Wonjun Yoon; Gihyun Kwon; Seungkyu Nam; Daeshik Kim An Empirical Evaluation of Adversarial Robustness under Transfer Learning.Todor Davchev; Timos Korres; Stathi Fotiadis; Nick Antonopoulos; Subramanian Ramamoorthy Adaptive Generation of Unrestricted Adversarial Inputs.Isaac Dunn; Hadrien Pouget; Tom Melham; Daniel Kroening 2019-05-06 Batch Normalization is a Cause of Adversarial Vulnerability.Angus Galloway; Anna Golubeva; Thomas Tanay; Medhat Moussa; Graham W. Taylor Adversarial Examples Are Not Bugs, They Are Features.Andrew Ilyas; Shibani Santurkar; Dimitris Tsipras; Logan Engstrom; Brandon Tran; Aleksander Madry 2019-05-05 Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples.Vikash Sehwag; Arjun Nitin Bhagoji; Liwei Song; Chawin Sitawarin; Daniel Cullina; Mung Chiang; Prateek Mittal 2019-05-03 Transfer of Adversarial Robustness Between Perturbation Types.Daniel Kang; Yi Sun; Tom Brown; Dan Hendrycks; Jacob Steinhardt 2019-05-02 Adversarial Training with Voronoi Constraints.Marc Khoury; Dylan Hadfield-Menell Weight Map Layer for Noise and Adversarial Attack Robustness.Mohammed Amer; Tomás Maul You Only Propagate Once: Accelerating Adversarial Training via Maximal Principle.Dinghuai Zhang; Tianyuan Zhang; Yiping Lu; Zhanxing Zhu; Bin Dong 2019-05-01 POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via Genetic Algorithm.Jinyin Chen; Mengmeng Su; Shijing Shen; Hui Xiong; Haibin Zheng NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks.Yandong Li; Lijun Li; Liqiang Wang; Tong Zhang; Boqing Gong Dropping Pixels for Adversarial Robustness.Hossein Hosseini; Sreeram Kannan; Radha Poovendran 2019-04-30 Test Selection for Deep Learning Systems.Wei Ma; Mike Papadakis; Anestis Tsakmalis; Maxime Cordy; Yves Le Traon Detecting Adversarial Examples through Nonlinear Dimensionality Reduction.Francesco Crecchi; Davide Bacciu; Battista Biggio 2019-04-29 Adversarial Training for Free!.Ali Shafahi; Mahyar Najibi; Amin Ghiasi; Zheng Xu; John Dickerson; Christoph Studer; Larry S. Davis; Gavin Taylor; Tom Goldstein Adversarial Training and Robustness for Multiple Perturbations.Florian Tramèr; Dan Boneh 2019-04-27 Non-Local Context Encoder: Robust Biomedical Image Segmentation against Adversarial Attacks.Xiang He; Sibei Yang; Guanbin Li?; Haofeng Li; Huiyou Chang; Yizhou Yu 2019-04-26 Robustness Verification of Support Vector Machines.Francesco Ranzato; Marco Zanella 2019-04-24 A Robust Approach for Securing Audio Classification Against Adversarial Attacks.Mohammad Esmaeilpour; Patrick Cardinal; Alessandro Lameiras Koerich Physical Adversarial Textures that Fool Visual Object Tracking.Rey Reza Wiyatno; Anqi Xu 2019-04-23 Minimizing Perceived Image Quality Loss Through Adversarial Attack Scoping.Kostiantyn Khabarlak; Larysa Koriashkina 2019-04-22 blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness.Jiaming Zhang; Jitao Sang; Kaiyuan Xu; Shangxi Wu; Yongli Hu; Yanfeng Sun; Jian Yu Using Videos to Evaluate Image Model Robustness.Keren Gu; Brandon Yang; Jiquan Ngiam; Quoc Le; Jonathon Shlens 2019-04-21 Beyond Explainability: Leveraging Interpretability for Improved Adversarial Learning.Devinder Kumar; Ibrahim Ben-Daya; Kanav Vats; Jeffery Feng; Graham Taylor and; Alexander Wong 2019-04-20 Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach.Rahim Taheri; Reza Javidan; Mohammad Shojafar; Vinod P; Mauro Conti 2019-04-19 Salient Object Detection in the Deep Learning Era: An In-Depth Survey.Wenguan Wang; Qiuxia Lai; Huazhu Fu; Jianbing Shen; Haibin Ling 2019-04-18 Fooling automated surveillance cameras: adversarial patches to attack person detection.Simen Thys; Ranst Wiebe Van; Toon Goedemé 2019-04-17 ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks.Guanxiong Liu; Issa Khalil; Abdallah Khreishah Defensive Quantization: When Efficiency Meets Robustness.Ji Lin; Chuang Gan; Song Han Interpreting Adversarial Examples with Attributes.Sadaf Gulshad; Jan Hendrik Metzen; Arnold Smeulders; Zeynep Akata Adversarial Defense Through Network Profiling Based Path Extraction.Yuxian Qiu; Jingwen Leng; Cong Guo; Quan Chen; Chao Li; Minyi Guo; Yuhao Zhu Gotta Catch 'Em All: Using Concealed Trapdoors to Detect Adversarial Attacks on Neural Networks.Shawn Shan; Emily Willson; Bolun Wang; Bo Li; Haitao Zheng; Ben Y. Zhao Semantic Adversarial Attacks: Parametric Transformations That Fool Deep Classifiers.Ameya Joshi; Amitangshu Mukherjee; Soumik Sarkar; Chinmay Hegde 2019-04-16 Reducing Adversarial Example Transferability Using Gradient Regularization.George Adam; Petr Smirnov; Benjamin Haibe-Kains; Anna Goldenberg AT-GAN: A Generative Attack Model for Adversarial Transferring on Generative Adversarial Nets.Xiaosen Wang; Kun He; Chuan Guo; Kilian Q. Weinberger; John E. Hopcroft 2019-04-15 Are Self-Driving Cars Secure? Evasion Attacks against Deep Neural Networks for Steering Angle Prediction.Alesia Chernikova; Alina Oprea; Cristina Nita-Rotaru; BaekGyu Kim Influence of Control Parameters and the Size of Biomedical Image Datasets on the Success of Adversarial Attacks.Vassili Kovalev; Dmitry Voynov 2019-04-13 Exploiting Vulnerabilities of Load Forecasting Through Adversarial Attacks.Yize Chen; Yushi Tan; Baosen Zhang 2019-04-12 Big but Imperceptible Adversarial Perturbations via Semantic Manipulation.Anand Bhattad; Min Jin Chong; Kaizhao Liang; Bo Li; David A. Forsyth Cycle-Consistent Adversarial GAN: the integration of adversarial attack and defense.Lingyun Jiang; Kai Qiao; Ruoxi Qin; Linyuan Wang; Jian Chen; Haibing Bu; Bin Yan Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks.David J. Miller; Zhen Xiang; George Kesidis Generating Minimal Adversarial Perturbations with Integrated Adaptive Gradients.Yatie Xiao; Chi-Man Pun Evaluating Robustness of Deep Image Super-Resolution against Adversarial Attacks.Jun-Ho Choi; Huan Zhang; Jun-Hyuk Kim; Cho-Jui Hsieh; Jong-Seok Lee 2019-04-11 Black-Box Decision based Adversarial Attack with Symmetric $\alpha$-stable Distribution.Vignesh Srinivasan; Ercan E. Kuruoglu; Klaus-Robert Müller; Wojciech Samek; Shinichi Nakajima 2019-04-10 Learning to Generate Synthetic Data via Compositing.Shashank Tripathi; Siddhartha Chandra; Amit Agrawal; Ambrish Tyagi; James M. Rehg; Visesh Chari Black-box Adversarial Attacks on Video Recognition Models.Linxi Jiang; Xingjun Ma; Shaoxiang Chen; James Bailey; Yu-Gang Jiang 2019-04-09 Generation & Evaluation of Adversarial Examples for Malware Obfuscation.Daniel Park; Haidar Khan; Bülent Yener 2019-04-08 Efficient Decision-based Black-box Adversarial Attacks on Face Recognition.Yinpeng Dong; Hang Su; Baoyuan Wu; Zhifeng Li; Wei Liu; Tong Zhang; Jun Zhu A Target-Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning.Shahbaz Rezaei; Xin Liu 2019-04-07 JumpReLU: A Retrofit Defense Strategy for Adversarial Attacks.N. Benjamin Erichson; Zhewei Yao; Michael W. Mahoney Malware Evasion Attack and Defense.Yonghong Huang; Utkarsh Verma; Celeste Fralick; Gabriel Infante-Lopez; Brajesh Kumarz; Carl Woodward 2019-04-06 On Training Robust PDF Malware Classifiers.Yizheng Chen; Shiqi Wang; Dongdong She; Suman Jana 2019-04-05 Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks.Yinpeng Dong; Tianyu Pang; Hang Su; Jun Zhu 2019-04-04 Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks.Fatemeh Sheikholeslami; Swayambhoo Jain; Georgios B. Giannakis White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks.Yotam Gil; Yoav Chai; Or Gorodissky; Jonathan Berant 2019-04-03 Understanding the efficacy, reliability and resiliency of computer vision techniques for malware detection and future research directions.Li Chen Interpreting Adversarial Examples by Activation Promotion and Suppression.Kaidi Xu; Sijia Liu; Gaoyuan Zhang; Mengshu Sun; Pu Zhao; Quanfu Fan; Chuang Gan; Xue Lin HopSkipJumpAttack: A Query-Efficient Decision-Based Attack.Jianbo Chen; Michael I. Jordan; Martin J. Wainwright Summit: Scaling Deep Learning Interpretability by Visualizing Activation and Attribution Summarizations.Fred Hohman; Haekyu Park; Caleb Robinson; Duen Horng Chau 2019-04-02 Adversarial Attacks against Deep Saliency Models.Zhaohui Che; Ali Borji; Guangtao Zhai; Suiyi Ling; Guodong Guo; Patrick Le Callet 2019-04-01 Curls & Whey: Boosting Black-Box Adversarial Attacks.Yucheng Shi; Siyu Wang; Yahong Han Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses.Yingwei Li; Song Bai; Cihang Xie; Zhenyu Liao; Xiaohui Shen; Alan L. Yuille Robustness of 3D Deep Learning in an Adversarial Setting.Matthew Wicker; Marta Kwiatkowska Defending against adversarial attacks by randomized diversification.Olga Taran; Shideh Rezaeifar; Taras Holotyak; Slava Voloshynovskiy Adversarial Defense by Restricting the Hidden Space of Deep Neural Networks.Aamir Mustafa; Salman Khan; Munawar Hayat; Roland Goecke; Jianbing Shen; Ling Shao 2019-03-31 On the Vulnerability of CNN Classifiers in EEG-Based BCIs.Xiao Zhang; Dongrui Wu 2019-03-29 Adversarial Robustness vs Model Compression, or Both?.Shaokai Ye; Kaidi Xu; Sijia Liu; Hao Cheng; Jan-Henrik Lambrechts; Huan Zhang; Aojun Zhou; Kaisheng Ma; Yanzhi Wang; Xue Lin 2019-03-28 Benchmarking Neural Network Robustness to Common Corruptions and Perturbations.Dan Hendrycks; Thomas Dietterich Smooth Adversarial Examples.Hanwei Zhang; Yannis Avrithis; Teddy Furon; Laurent Amsaleg 2019-03-27 Rallying Adversarial Techniques against Deep Learning for Network Security.Joseph Clements; Yuzhe Yang; Ankur Sharma; Hongxin Hu; Yingjie Lao Bridging Adversarial Robustness and Gradient Interpretability.Beomsu Kim; Junghoon Seo; Taegyun Jeon Text Processing Like Humans Do: Visually Attacking and Shielding NLP Systems.Steffen Eger; Gözde Gül Şahin; Andreas Rücklé; Ji-Ung Lee; Claudia Schulz; Mohsen Mesgar; Krishnkant Swarnkar; Edwin Simpson; Iryna Gurevych Scaling up the randomized gradient-free adversarial attack reveals overestimation of robustness using established attacks.Francesco Croce; Jonas Rauber; Matthias Hein 2019-03-26 On the Adversarial Robustness of Multivariate Robust Estimation.Erhan Bayraktar; Lifeng Lai A geometry-inspired decision-based attack.Yujia Liu; Seyed-Mohsen Moosavi-Dezfooli; Pascal Frossard 2019-03-25 Defending against Whitebox Adversarial Attacks via Randomized Discretization.Yuchen Zhang; Percy Liang Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness.Jörn-Henrik Jacobsen; Jens Behrmannn; Nicholas Carlini; Florian Tramèr; Nicolas Papernot The LogBarrier adversarial attack: making effective use of decision boundary information.Chris Finlay; Aram-Alexandre Pooladian; Adam M. Oberman Robust Neural Networks using Randomized Adversarial Training.Alexandre Araujo; Rafael Pinot; Benjamin Negrevergne; Laurent Meunier; Yann Chevaleyre; Florian Yger; Jamal Atif 2019-03-24 A Formalization of Robustness for Deep Neural Networks.Tommaso Dreossi; Shromona Ghosh; Alberto Sangiovanni-Vincentelli; Sanjit A. Seshia Variational Inference with Latent Space Quantization for Adversarial Resilience.Vinay Kyatham; Mayank Mishra; Tarun Kumar Yadav; Deepak Mishra; Prathosh AP 2019-03-23 Improving Adversarial Robustness via Guided Complement Entropy.Hao-Yun Chen; Jhao-Hong Liang; Shih-Chieh Chang; Jia-Yu Pan; Yu-Ting Chen; Wei Wei; Da-Cheng Juan 2019-03-22 Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition.Yao Qin; Nicholas Carlini; Ian Goodfellow; Garrison Cottrell; Colin Raffel 2019-03-21 Adversarial camera stickers: A physical camera-based attack on deep learning systems.Juncheng Li; Frank R. Schmidt; J. Zico Kolter 2019-03-20 Provable Certificates for Adversarial Examples: Fitting a Ball in the Union of Polytopes.Matt Jordan; Justin Lewis; Alexandros G. Dimakis 2019-03-19 On the Robustness of Deep K-Nearest Neighbors.Chawin Sitawarin; David Wagner 2019-03-18 Generating Adversarial Examples With Conditional Generative Adversarial Net.Ping Yu; Kaitao Song; Jianfeng Lu Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems.Hadi Abdullah; Washington Garcia; Christian Peeters; Patrick Traynor; Kevin R. B. Butler; Joseph Wilson 2019-03-17 Adversarial Attacks on Deep Neural Networks for Time Series Classification.Hassan Ismail Fawaz; Germain Forestier; Jonathan Weber; Lhassane Idoumghar; Pierre-Alain Muller 2019-03-15 On Evaluation of Adversarial Perturbations for Sequence-to-Sequence Models.Paul Michel; Xian Li; Graham Neubig; Juan Miguel Pino On Certifying Non-uniform Bound against Adversarial Attacks.Chen Liu; Ryota Tomioka; Volkan Cevher 2019-03-14 A Research Agenda: Dynamic Models to Defend Against Correlated Attacks.Ian Goodfellow Attribution-driven Causal Analysis for Detection of Adversarial Examples.Susmit Jha; Sunny Raj; Steven Lawrence Fernandes; Sumit Kumar Jha; Somesh Jha; Gunjan Verma; Brian Jalaian; Ananthram Swami 2019-03-13 Adversarial attacks against Fact Extraction and VERification.James Thorne; Andreas Vlachos 2019-03-12 Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models.Adith Boloor; Xin He; Christopher Gill; Yevgeniy Vorobeychik; Xuan Zhang 2019-03-11 Can Adversarial Network Attack be Defended?.Jinyin Chen; Yangyang Wu; Xiang Lin; Qi Xuan 2019-03-09 Manifold Preserving Adversarial Learning.Ousmane Amadou Dia; Elnaz Barshan; Reza Babanezhad 2019-03-07 Attack Type Agnostic Perceptual Enhancement of Adversarial Images.Bilgin Aksoy; Alptekin Temizel Out-domain examples for generative models.Dario Pasquini; Marco Mingione; Massimo Bernaschi 2019-03-06 GanDef: A GAN based Adversarial Training Defense for Neural Network Classifier.Guanxiong Liu; Issa Khalil; Abdallah Khreishah 2019-03-05 Statistical Guarantees for the Robustness of Bayesian Neural Networks.Luca Cardelli; Marta Kwiatkowska; Luca Laurenti; Nicola Paoletti; Andrea Patane; Matthew Wicker L 1-norm double backpropagation adversarial defense.Ismaïla LIMOS, LITIS Seck; Gaëlle LIMOS Loosli; Stephane LITIS Canu 2019-03-04 Defense Against Adversarial Images using Web-Scale Nearest-Neighbor Search.Abhimanyu Dubey; der Maaten Laurens van; Zeki Yalniz; Yixuan Li; Dhruv Mahajan The Vulnerabilities of Graph Convolutional Networks: Stronger Attacks and Defensive Techniques.Huijun Wu; Chen Wang; Yuriy Tyshetskiy; Andrew Dotcherty; Kai Lu; Liming Zhu Safety Verification and Robustness Analysis of Neural Networks via Quadratic Constraints and Semidefinite Programming.Mahyar Fazlyab; Manfred Morari; George J. Pappas Complement Objective Training.Hao-Yun Chen; Pei-Hsin Wang; Chun-Hao Liu; Shih-Chieh Chang; Jia-Yu Pan; Yu-Ting Chen; Wei Wei; Da-Cheng Juan 2019-03-03 A Kernelized Manifold Mapping to Diminish the Effect of Adversarial Perturbations.Saeid Asgari Taghanaki; Kumar Abhishek; Shekoofeh Azizi; Ghassan Hamarneh 2019-03-01 Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications.Bryse Flowers; R. Michael Buehrer; William C. Headley PuVAE: A Variational Autoencoder to Purify Adversarial Examples.Uiwon Hwang; Jaewoo Park; Hyemi Jang; Sungroh Yoon; Nam Ik Cho Attacking Graph-based Classification via Manipulating the Graph Structure.Binghui Wang; Neil Zhenqiang Gong 2019-02-28 On the Effectiveness of Low Frequency Perturbations.Yash Sharma; Gavin Weiguang Ding; Marcus Brubaker Enhancing the Robustness of Deep Neural Networks by Boundary Conditional GAN.Ke Sun; Zhanxing Zhu; Zhouchen Lin Towards Understanding Adversarial Examples Systematically: Exploring Data Size, Task and Model Factors.Ke Sun; Zhanxing Zhu; Zhouchen Lin Adversarial Attack and Defense on Point Sets.Jiancheng Yang; Qiang Zhang; Rongyao Fang; Bingbing Ni; Jinxian Liu; Qi Tian 2019-02-27 Stochastically Rank-Regularized Tensor Regression Networks.Arinbjörn Kolbeinsson; Jean Kossaifi; Yannis Panagakis; Anima Anandkumar; Ioanna Tzoulaki; Paul Matthews Adversarial Attacks on Time Series.Fazle Karim; Somshubra Majumdar; Houshang Darabi Communication without Interception: Defense against Deep-Learning-based Modulation Detection.Muhammad Zaid Hameed; Andras Gyorgy; Deniz Gunduz Robust Decision Trees Against Adversarial Examples.Hongge Chen; Huan Zhang; Duane Boning; Cho-Jui Hsieh 2019-02-26 Disentangled Deep Autoencoding Regularization for Robust Image Classification.Zhenyu Duan; Martin Renqiang Min; Li Erran Li; Mingbo Cai; Yi Xu; Bingbing Ni Analyzing Deep Neural Networks with Symbolic Propagation: Towards Higher Precision and Faster Verification.Pengfei Yang; Jiangchao Liu; Jianlin Li; Liqian Chen; Xiaowei Huang 2019-02-25 Verification of Non-Linear Specifications for Neural Networks.Chongli Dj Qin; Dj Krishnamurthy; Dvijotham; Brendan O'Donoghue; Rudy Bunel; Robert Stanforth; Sven Gowal; Jonathan Uesato; Grzegorz Swirszcz; Pushmeet Kohli Adversarial attacks hidden in plain sight.Jan Philip Göpfert; André Artelt; Heiko Wersing; Barbara Hammer 2019-02-24 MaskDGA: A Black-box Evasion Technique Against DGA Classifiers and Adversarial Defenses.Lior Sidi; Asaf Nadler; Asaf Shabtai Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking.Yi Han; David Hubczenko; Paul Montague; Vel Olivier De; Tamas Abraham; Benjamin I. P. Rubinstein; Christopher Leckie; Tansu Alpcan; Sarah Erfani 2019-02-23 Re-evaluating ADEM: A Deeper Look at Scoring Dialogue Responses.Ananya B. Sai; Mithun Das Gupta; Mitesh M. Khapra; Mukundhan Srinivasan A Deep, Information-theoretic Framework for Robust Biometric Recognition.Renjie Xie; Yanzhi Chen; Yan Wo; Qiao Wang 2019-02-22 Adversarial Attacks on Graph Neural Networks via Meta Learning.Daniel Zügner; Stephan Günnemann Physical Adversarial Attacks Against End-to-End Autoencoder Communication Systems.Meysam Sadeghi; Erik G. Larsson A Convex Relaxation Barrier to Tight Robustness Verification of Neural Networks.Hadi Salman; Greg Yang; Huan Zhang; Cho-Jui Hsieh; Pengchuan Zhang 2019-02-21 On the Sensitivity of Adversarial Robustness to Input Data Distributions.Gavin Weiguang Ding; Kry Yik Chau Lui; Xiaomeng Jin; Luyu Wang; Ruitong Huang Quantifying Perceptual Distortion of Adversarial Examples.Matt Jordan; Naren Manoj; Surbhi Goel; Alexandros G. Dimakis Wasserstein Adversarial Examples via Projected Sinkhorn Iterations.Eric Wong; Frank R. Schmidt; J. Zico Kolter 2019-02-20 Graph Adversarial Training: Dynamically Regularizing Based on Graph Structure.Fuli Feng; Xiangnan He; Jie Tang; Tat-Seng Chua advertorch v0.1: An Adversarial Robustness Toolbox based on PyTorch.Gavin Weiguang Ding; Luyu Wang; Xiaomeng Jin Perceptual Quality-preserving Black-Box Attack against Deep Learning Image Classifiers.Diego Gragnaniello; Francesco Marra; Giovanni Poggi; Luisa Verdoliva 2019-02-19 There are No Bit Parts for Sign Bits in Black-Box Attacks.Abdullah Al-Dujaili; Una-May O'Reilly 2019-02-18 On Evaluating Adversarial Robustness.Nicholas Carlini; Anish Athalye; Nicolas Papernot; Wieland Brendel; Jonas Rauber; Dimitris Tsipras; Ian Goodfellow; Aleksander Madry; Alexey Kurakin AuxBlocks: Defense Adversarial Example via Auxiliary Blocks.Yueyao Yu; Pengfei Yu; Wenye Li Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces.Mohsen Imani; Mohammad Saidur Rahman; Nate Mathews; Matthew Wright 2019-02-16 Mitigation of Adversarial Examples in RF Deep Classifiers Utilizing AutoEncoder Pre-training.Silvija Kokalj-Filipovic; Rob Miller; Nicholas Chang; Chi Leung Lau Adversarial Examples in RF Deep Learning: Detection of the Attack and its Physical Robustness.Silvija Kokalj-Filipovic; Rob Miller 2019-02-15 DeepFault: Fault Localization for Deep Neural Networks.Hasan Ferit Eniser; Simos Gerasimou; Alper Sen 2019-02-14 Can Intelligent Hyperparameter Selection Improve Resistance to Adversarial Examples?.Cody Burkard; Brent Lagesse 2019-02-13 The Odds are Odd: A Statistical Test for Detecting Adversarial Examples.Kevin Roth; Yannic Kilcher; Thomas Hofmann 2019-02-12 Examining Adversarial Learning against Graph-based IoT Malware Detection Systems.Ahmed Abusnaina; Aminollah Khormali; Hisham Alasmary; Jeman Park; Afsah Anwar; Ulku Meteriz; Aziz Mohaisen 2019-02-11 Adversarial Samples on Android Malware Detection Systems for IoT Systems.Xiaolei Liu; Xiaojiang Du; Xiaosong Zhang; Qingxin Zhu; Mohsen Guizani A Survey: Towards a Robust Deep Neural Network in Text Domain.Wenqi Wang; Lina Wang; Benxiao Tang; Run Wang; Aoshuang Ye 2019-02-09 Model Compression with Adversarial Robustness: A Unified Optimization Framework.Shupeng University of Rochester Gui; Haotao Texas A&M University Wang; Chen University of Rochester Yu; Haichuan University of Rochester Yang; Zhangyang Texas A&M University Wang; Ji Ytech Seattle AI lab, FeDA lab, AI platform, Kwai Inc Liu When Causal Intervention Meets Adversarial Examples and Image Masking for Deep Neural Networks.Chao-Han Huck Yang; Yi-Chieh Liu; Pin-Yu Chen; Xiaoli Ma; Yi-Chang James Tsai 2019-02-08 Minimal Images in Deep Neural Networks: Fragile Object Recognition in Natural Images.Sanjana Srivastava; Guy Ben-Yosef; Xavier Boix Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis.Danilo Vasconcellos Vargas; Jiawei Su Discretization based Solutions for Secure Machine Learning against Adversarial Attacks.Priyadarshini Panda; Indranil Chakraborty; Kaushik Roy 2019-02-07 Robustness Of Saak Transform Against Adversarial Attacks.Thiyagarajan Ramanathan; Abinaya Manimaran; Suya You; C-C Jay Kuo Certified Adversarial Robustness via Randomized Smoothing.Jeremy M Cohen; Elan Rosenfeld; J. Zico Kolter 2019-02-06 Fooling Neural Network Interpretations via Adversarial Model Manipulation.Juyeon Heo; Sunghwan Joo; Taesup Moon Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples.Derui Wang; Chaoran Li; Sheng Wen; Xiaojun Chang; Surya Nepal; Yang Xiang 2019-02-05 Fatal Brain Damage.El Mahdi El Mhamdi; Rachid Guerraoui; Sergei Volodin 2019-02-04 SNN under Attack: are Spiking Deep Belief Networks vulnerable to Adversarial Examples?.Alberto Marchisio; Giorgio Nanfa; Faiq Khalid; Muhammad Abdullah Hanif; Maurizio Martina; Muhammad Shafique Theoretical evidence for adversarial robustness through randomization.Rafael Pinot; Laurent Meunier; Alexandre Araujo; Hisashi Kashima; Florian Yger; Cédric Gouy-Pailler; Jamal Atif 2019-02-01 Robustness Certificates Against Adversarial Examples for ReLU Networks.Sahil Singla; Soheil Feizi Natural and Adversarial Error Detection using Invariance to Image Transformations.Yuval Bahat; Michal Irani; Gregory Shakhnarovich Adaptive Gradient for Adversarial Perturbations Generation.Yatie Xiao; Chi-Man Pun Robustness of Generalized Learning Vector Quantization Models against Adversarial Attacks.Sascha Saralajew; Lars Holdijk; Maike Rees; Thomas Villmann The Efficacy of SHIELD under Different Threat Models.Cory Cornelius; Nilaksh Das; Shang-Tse Chen; Li Chen; Michael E. Kounavis; Duen Horng Chau 2019-01-31 A New Family of Neural Networks Provably Resistant to Adversarial Attacks.Rakshit Agrawal; Alfaro Luca de; David Helmbold Training Artificial Neural Networks by Generalized Likelihood Ratio Method: Exploring Brain-like Learning to Improve Robustness.Li Xiao; Yijie Peng; Jeff Hong; Zewu Ke; Shuhuai Yang 2019-01-30 A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance.Adi Shamir; Itay Safran; Eyal Ronen; Orr Dunkelman Augmenting Model Robustness with Transformation-Invariant Attacks.Houpu Yao; Zhe Wang; Guangyu Nie; Yassine Mazboudi; Yezhou Yang; Yi Ren 2019-01-29 Metric Attack and Defense for Person Re-identification.Song Bai; Yingwei Li; Yuyin Zhou; Qizhu Li; Philip H. S. Torr Adversarial Examples Are a Natural Consequence of Test Error in Noise.Nic Ford; Justin Gilmer; Nicolas Carlini; Dogus Cubuk On the Effect of Low-Rank Weights on Adversarial Robustness of Neural Networks.Peter Langeberg; Emilio Rafael Balda; Arash Behboodi; Rudolf Mathar RED-Attack: Resource Efficient Decision based Attack for Machine Learning.Faiq Khalid; Hassan Ali; Muhammad Abdullah Hanif; Semeen Rehman; Rehan Ahmed; Muhammad Shafique Reliable Smart Road Signs.Muhammed O. Sayin; Chung-Wei Lin; Eunsuk Kang; Shinichi Shiraishi; Tamer Basar 2019-01-28 Improving Adversarial Robustness of Ensembles with Diversity Training.Sanjay Kariyappa; Moinuddin K. Qureshi CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks.Alberto Marchisio; Giorgio Nanfa; Faiq Khalid; Muhammad Abdullah Hanif; Maurizio Martina; Muhammad Shafique Defense Methods Against Adversarial Examples for Recurrent Neural Networks.Ishai Rosenberg; Asaf Shabtai; Yuval Elovici; Lior Rokach Using Pre-Training Can Improve Model Robustness and Uncertainty.Dan Hendrycks; Kimin Lee; Mantas Mazeika 2019-01-27 An Information-Theoretic Explanation for the Adversarial Fragility of AI Classifiers.Hui Xie; Jirong Yi; Weiyu Xu; Raghu Mudumbai Characterizing the Shape of Activation Space in Deep Neural Networks.Thomas Gebhart; Paul Schrater; Alan Hylton Strong Black-box Adversarial Attacks on Unsupervised Machine Learning Models.Anshuman Chhabra; Abhishek Roy; Prasant Mohapatra 2019-01-26 A Black-box Attack on Neural Networks Based on Swarm Evolutionary Algorithm.Xiaolei Liu; Yuheng Luo; Xiaosong Zhang; Qingxin Zhu Towards Weighted-Sampling Audio Adversarial Example Attack.Xiaolei Liu; Xiaosong Zhang; Kun Wan; Qingxin Zhu; Yufei Ding 2019-01-25 Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data.Yi Shi; Yalin E. Sagduyu; Kemal Davaslioglu; Jason H. Li Improving Adversarial Robustness via Promoting Ensemble Diversity.Tianyu Pang; Kun Xu; Chao Du; Ning Chen; Jun Zhu 2019-01-24 Towards Interpretable Deep Neural Networks by Leveraging Adversarial Examples.Yinpeng Dong; Fan Bao; Hang Su; Jun Zhu Cross-Entropy Loss and Low-Rank Features Have Responsibility for Adversarial Examples.Kamil Nar; Orhan Ocal; S. Shankar Sastry; Kannan Ramchandran Theoretically Principled Trade-off between Robustness and Accuracy.Hongyang Zhang; Yaodong Yu; Jiantao Jiao; Eric P. Xing; Laurent El Ghaoui; Michael I. Jordan 2019-01-23 Sitatapatra: Blocking the Transfer of Adversarial Samples.Ilia Shumailov; Xitong Gao; Yiren Zhao; Robert Mullins; Ross Anderson; Cheng-Zhong Xu SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems.Tianyu Du; Shouling Ji; Jinfeng Li; Qinchen Gu; Ting Wang; Raheem Beyah 2019-01-21 Sensitivity Analysis of Deep Neural Networks.Hai Shu; Hongtu Zhu Universal Rules for Fooling Deep Neural Networks based Text Classification.Di Li; Danilo Vasconcellos Vargas; Sakurai Kouichi Perception-in-the-Loop Adversarial Examples.Mahmoud Salamati; Sadegh Soudjani; Rupak Majumdar Adversarial Attacks on Deep Learning Models in Natural Language Processing: A Survey.Wei Emma Zhang; Quan Z. Sheng; Ahoud Alhazmi; Chenliang Li 2019-01-17 Easy to Fool? Testing the Anti-evasion Capabilities of PDF Malware Scanners.Saeed TU Darmstadt Ehteshamifar; Antonio xorlab Barresi; Thomas R. ETH Zurich Gross; Michael TU Darmstadt Pradel 2019-01-15 The Limitations of Adversarial Training and the Blind-Spot Attack.Huan Zhang; Hongge Chen; Zhao Song; Duane Boning; Inderjit S. Dhillon; Cho-Jui Hsieh 2019-01-13 Generating Adversarial Perturbation with Root Mean Square Gradient.Yatie Xiao; Chi-Man Pun; Jizhe Zhou 2019-01-12 ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System.Huangxun Chen; Chenyu Huang; Qianyi Huang; Qian Zhang; Wei Wang 2019-01-11 Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries.Luca Demetrio; Battista Biggio; Giovanni Lagorio; Fabio Roli; Alessandro Armando 2019-01-10 Characterizing and evaluating adversarial examples for Offline Handwritten Signature Verification.Luiz G. Hafemann; Robert Sabourin; Luiz S. Oliveira Image Transformation can make Neural Networks more robust against Adversarial Examples.Dang Duy Thang; Toshihiro Matsui 2019-01-09 Extending Adversarial Attacks and Defenses to Deep 3D Point Cloud Classifiers.Daniel Liu; Ronald Yu; Hao Su 2019-01-08 Interpretable BoW Networks for Adversarial Example Detection.Krishna Kanth Nakka; Mathieu Salzmann 2019-01-07 Image Super-Resolution as a Defense Against Adversarial Attacks.Aamir Mustafa; Salman H. Khan; Munawar Hayat; Jianbing Shen; Ling Shao 2019-01-05 Fake News Detection via NLP is Vulnerable to Adversarial Attacks.Zhixuan Zhou; Huankang Guan; Meghana Moorthy Bhat; Justin Hsu 2019-01-04 Adversarial Examples Versus Cloud-based Detectors: A Black-box Empirical Study.Xurong Li; Shouling Ji; Meng Han; Juntao Ji; Zhenyu Ren; Yushan Liu; Chunming Wu 2019-01-02 Multi-Label Adversarial Perturbations.Qingquan Song; Haifeng Jin; Xiao Huang; Xia Hu Adversarial Robustness May Be at Odds With Simplicity.Preetum Nakkiran 2019-01-01 A Noise-Sensitivity-Analysis-Based Test Prioritization Technique for Deep Neural Networks.Long Zhang; Xuechao Sun; Yong Li; Zhenyu Zhang 2018-12-27 DeepBillboard: Systematic Physical-World Testing of Autonomous Driving Systems.Husheng Zhou; Wei Li; Yuankun Zhu; Yuqun Zhang; Bei Yu; Lingming Zhang; Cong Liu 2018-12-26 Adversarial Attack and Defense on Graph Data: A Survey.Lichao Sun; Ji Wang; Philip S. Yu; Bo Li 2018-12-25 A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples.Qiang Zeng; Jianhai Su; Chenglong Fu; Golam Kayas; Lannan Luo A Data-driven Adversarial Examples Recognition Framework via Adversarial Feature Genome.Li Chen; Hailun Ding; Qi Li; Jiawei Zhu; Jian Peng; Haifeng Li Noise Flooding for Detecting Audio Adversarial Examples Against Automatic Speech Recognition.Krishan Rajaratnam; Jugal Kalita PPD: Permutation Phase Defense Against Adversarial Examples in Deep Learning.Mehdi Jafarnia-Jahromi; Tasmin Chowdhury; Hsin-Tai Wu; Sayandev Mukherjee Seeing isn't Believing: Practical Adversarial Attack Against Object Detectors.Yue Zhao; Hong Zhu; Ruigang Liang; Qintao Shen; Shengzhi Zhang; Kai Chen 2018-12-24 DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense.Hang Zhou; Kejiang Chen; Weiming Zhang; Han Fang; Wenbo Zhou; Nenghai Yu 2018-12-23 Guessing Smart: Biased Sampling for Efficient Black-Box Adversarial Attacks.Thomas Brunner; Frederik Diehl; Michael Truong Le; Alois Knoll Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks.Ankur Chowdhary; Sailik Sengupta; Dijiang Huang; Subbarao Kambhampati Increasing the adversarial robustness and explainability of capsule networks with $\gamma$-capsules. (2%)David Peer; Sebastian Stabinger; Antonio Rodriguez-Sanchez 2018-12-22 Exploiting the Inherent Limitation of L0 Adversarial Examples.Fei Zuo; Bokai Yang; Xiaopeng Li; Lannan Luo; Qiang Zeng 2018-12-21 Dissociable neural representations of adversarially perturbed images in deep neural networks and the human brain.Chi Zhang; Xiaohan Duan; Linyuan Wang; Yongli Li; Bin Yan; Guoen Hu; Ruyuan Zhang; Li Tong 2018-12-19 Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and AICS'2019 Challenge.Deqiang Li; Qianmu Li; Yanfang Ye; Shouhuai Xu 2018-12-18 PROVEN: Certifying Robustness of Neural Networks with a Probabilistic Approach.Tsui-Wei Weng; Pin-Yu Chen; Lam M. Nguyen; Mark S. Squillante; Ivan Oseledets; Luca Daniel 2018-12-17 Spartan Networks: Self-Feature-Squeezing Neural Networks for increased robustness in adversarial settings.François Menet; Paul Berthier; José M. Fernandez; Michel Gagnon Designing Adversarially Resilient Classifiers using Resilient Feature Engineering.Kevin Eykholt; Atul Prakash A Survey of Safety and Trustworthiness of Deep Neural Networks.Xiaowei Huang; Daniel Kroening; Wenjie Ruan; James Sharp; Youcheng Sun; Emese Thamo; Min Wu; Xinping Yi 2018-12-16 Defense-VAE: A Fast and Accurate Defense against Adversarial Attacks.Xiang Li; Shihao Ji 2018-12-15 Perturbation Analysis of Learning Algorithms: A Unifying Perspective on Generation of Adversarial Examples.Emilio Rafael Balda; Arash Behboodi; Rudolf Mathar Trust Region Based Adversarial Attack on Neural Networks.Zhewei Yao; Amir Gholami; Peng Xu; Kurt Keutzer; Michael Mahoney 2018-12-14 Adversarial Sample Detection for Deep Neural Network through Model Mutation Testing.Jingyi Wang; Guoliang Dong; Jun Sun; Xinyu Wang; Peixin Zhang 2018-12-13 TextBugger: Generating Adversarial Text Against Real-world Applications.Jinfeng Li; Shouling Ji; Tianyu Du; Bo Li; Ting Wang Why ReLU networks yield high-confidence predictions far away from the training data and how to mitigate the problem.Matthias Hein; Maksym Andriushchenko; Julian Bitterwolf 2018-12-12 Thwarting Adversarial Examples: An $L_0$-RobustSparse Fourier Transform.Mitali Bafna; Jack Murtagh; Nikhil Vyas 2018-12-11 Mix'n'Squeeze: Thwarting Adaptive Adversarial Samples Using Randomized Squeezing.Kumar Sharad; Giorgia Azzurra Marson; Hien Thi Thu Truong; Ghassan Karame Adversarial Framing for Image and Video Classification.Konrad Zolna; Michal Zajac; Negar Rostamzadeh; Pedro O. Pinheiro 2018-12-10 Defending Against Universal Perturbations With Shared Adversarial Training.Chaithanya Kumar Mummadi; Thomas Brox; Jan Hendrik Metzen 2018-12-08 Learning Transferable Adversarial Examples via Ghost Networks.Yingwei Li; Song Bai; Yuyin Zhou; Cihang Xie; Zhishuai Zhang; Alan Yuille Feature Denoising for Improving Adversarial Robustness.Cihang Xie; Yuxin Wu; der Maaten Laurens van; Alan Yuille; Kaiming He AutoGAN: Robust Classifier Against Adversarial Attacks.Blerta Lindqvist; Shridatt Sugrim; Rauf Izmailov Detecting Adversarial Examples in Convolutional Neural Networks.Stefanos Pertigkiozoglou; Petros Maragos 2018-12-07 Deep-RBF Networks Revisited: Robust Classification with Rejection.Pourya Habib Zadeh; Reshad Hosseini; Suvrit Sra Combatting Adversarial Attacks through Denoising and Dimensionality Reduction: A Cascaded Autoencoder Approach.Rajeev Sahay; Rehana Mahfuz; Aly El Gamal 2018-12-06 Adversarial Defense of Image Classification Using a Variational Auto-Encoder.Yi Luo; Henry Pfister Adversarial Attacks, Regression, and Numerical Stability Regularization.Andre T. Nguyen; Edward Raff Prior Networks for Detection of Adversarial Attacks.Andrey Malinin; Mark Gales Towards Leveraging the Information of Gradients in Optimization-based Adversarial Attack.Jingyang Zhang; Hsin-Pai Cheng; Chunpeng Wu; Hai Li; Yiran Chen Fooling Network Interpretation in Image Classification.Akshayvarun Subramanya; Vipin Pillai; Hamed Pirsiavash The Limitations of Model Uncertainty in Adversarial Settings.Kathrin Grosse; David Pfaff; Michael Thomas Smith; Michael Backes Max-Margin Adversarial (MMA) Training: Direct Input Space Margin Maximization through Adversarial Training.Gavin Weiguang Ding; Yash Sharma; Kry Yik Chau Lui; Ruitong Huang 2018-12-05 On Configurable Defense against Adversarial Example Attacks.Bo Luo; Min Li; Yu Li; Qiang Xu SADA: Semantic Adversarial Diagnostic Attacks for Autonomous Applications.Abdullah Hamdi; Matthias Müller; Bernard Ghanem Regularized Ensembles and Transferability in Adversarial Learning.Yifan Chen; Yevgeniy Vorobeychik 2018-12-04 Rigorous Agent Evaluation: An Adversarial Approach to Uncover Catastrophic Failures.Jonathan Dj Uesato; Ananya Dj Kumar; Csaba Dj Szepesvari; Tom Dj Erez; Avraham Dj Ruderman; Keith Dj Anderson; Dj Krishmamurthy; Dvijotham; Nicolas Heess; Pushmeet Kohli Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples.Huangyi Ge; Sze Yiu Chau; Bruno Ribeiro; Ninghui Li 2018-12-03 Disentangling Adversarial Robustness and Generalization.David Stutz; Matthias Hein; Bernt Schiele Interpretable Deep Learning under Fire.Xinyang Zhang; Ningfei Wang; Hua Shen; Shouling Ji; Xiapu Luo; Ting Wang Adversarial Example Decomposition.Horace He; Aaron Lou; Qingxuan Jiang; Isay Katsman; Serge Belongie; Ser-Nam Lim 2018-12-02 Model-Reuse Attacks on Deep Learning Systems.Yujie Ji; Xinyang Zhang; Shouling Ji; Xiapu Luo; Ting Wang Universal Perturbation Attack Against Image Retrieval.Jie Li; Rongrong Ji; Hong Liu; Xiaopeng Hong; Yue Gao; Qi Tian 2018-12-01 FineFool: Fine Object Contour Attack via Attention.Jinyin Chen; Haibin Zheng; Hui Xiong; Mengmeng Su SentiNet: Detecting Physical Attacks Against Deep Learning Systems.Edward Chou; Florian Tramèr; Giancarlo Pellegrino; Dan Boneh Building robust classifiers through generation of confident out of distribution examples.Kumar Sricharan; Ashok Srivastava Effects of Loss Functions And Target Representations on Adversarial Robustness.Sean Saito; Sujoy Roy Discrete Adversarial Attacks and Submodular Optimization with Applications to Text Classification.Qi Lei; Lingfei Wu; Pin-Yu Chen; Alexandros G. Dimakis; Inderjit S. Dhillon; Michael Witbrock 2018-11-30 Transferable Adversarial Attacks for Image and Video Object Detection.Xingxing Wei; Siyuan Liang; Xiaochun Cao; Jun Zhu ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples.Xiaojun Jia; Xingxing Wei; Xiaochun Cao; Hassan Foroosh Adversarial Defense by Stratified Convolutional Sparse Coding.Bo Sun; Nian-hsuan Tsai; Fangchen Liu; Ronald Yu; Hao Su 2018-11-29 CNN-Cert: An Efficient Framework for Certifying Robustness of Convolutional Neural Networks.Akhilan Boopathy; Tsui-Wei Weng; Pin-Yu Chen; Sijia Liu; Luca Daniel Bayesian Adversarial Spheres: Bayesian Inference and Adversarial Examples in a Noiseless Setting.Artur Bekasov; Iain Murray Adversarial Examples as an Input-Fault Tolerance Problem.Angus Galloway; Anna Golubeva; Graham W. Taylor Analyzing Federated Learning through an Adversarial Lens.Arjun Nitin Bhagoji; Supriyo Chakraborty; Prateek Mittal; Seraphin Calo 2018-11-28 Adversarial Attacks for Optical Flow-Based Action Recognition Classifiers.Nathan Inkawhich; Matthew Inkawhich; Yiran Chen; Hai Li Strike (with) a Pose: Neural Networks Are Easily Fooled by Strange Poses of Familiar Objects.Michael A. Alcorn; Qi Li; Zhitao Gong; Chengfei Wang; Long Mai; Wei-Shinn Ku; Anh Nguyen A randomized gradient-free attack on ReLU networks.Francesco Croce; Matthias Hein Adversarial Machine Learning And Speech Emotion Recognition: Utilizing Generative Adversarial Networks For Robustness.Siddique Latif; Rajib Rana; Junaid Qadir 2018-11-27 Universal Adversarial Training.Ali Shafahi; Mahyar Najibi; Zheng Xu; John Dickerson; Larry S. Davis; Tom Goldstein Robust Classification of Financial Risk.Suproteem K. Sarkar; Kojin Oshiba; Daniel Giebisch; Yaron Singer Using Attribution to Decode Dataset Bias in Neural Network Models for Chemistry.Kevin McCloskey; Ankur Taly; Federico Monti; Michael P. Brenner; Lucy Colwell A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks.Jinghui Chen; Dongruo Zhou; Jinfeng Yi; Quanquan Gu 2018-11-26 ResNets Ensemble via the Feynman-Kac Formalism to Improve Natural and Robust Accuracies.Bao Wang; Binjie Yuan; Zuoqiang Shi; Stanley J. Osher Bilateral Adversarial Training: Towards Fast Training of More Robust Models Against Adversarial Attacks.Jianyu Wang; Haichao Zhang 2018-11-25 Is Data Clustering in Adversarial Settings Secure?.Battista Biggio; Ignazio Pillai; Samuel Rota Bulò; Davide Ariu; Marcello Pelillo; Fabio Roli 2018-11-24 Attention, Please! Adversarial Defense via Attention Rectification and Preservation.Shangxi Wu; Jitao Sang; Kaiyuan Xu; Jiaming Zhang; Yanfeng Sun; Liping Jing; Jian Yu 2018-11-23 Robustness via curvature regularization, and vice versa.Seyed-Mohsen Moosavi-Dezfooli; Alhussein Fawzi; Jonathan Uesato; Pascal Frossard Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses.Jérôme Rony; Luiz G. Hafemann; Luiz S. Oliveira; Ismail Ben Ayed; Robert Sabourin; Eric Granger 2018-11-22 Parametric Noise Injection: Trainable Randomness to Improve Deep Neural Network Robustness against Adversarial Attack.Adnan Siraj Rakin; Zhezhi He; Deliang Fan Strength in Numbers: Trading-off Robustness and Computation via Adversarially-Trained Ensembles.Edward Grefenstette; Robert Stanforth; Brendan O'Donoghue; Jonathan Uesato; Grzegorz Swirszcz; Pushmeet Kohli Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces.Ziv Katzir; Yuval Elovici 2018-11-21 Task-generalizable Adversarial Attack based on Perceptual Metric.Muzammal Naseer; Salman H. Khan; Shafin Rahman; Fatih Porikli Towards Robust Neural Networks with Lipschitz Continuity.Muhammad Usama; Dong Eui Chang 2018-11-20 How the Softmax Output is Misleading for Evaluating the Strength of Adversarial Examples.Utku Ozbulak; Neve Wesley De; Messem Arnout Van MimicGAN: Corruption-Mimicking for Blind Image Recovery & Adversarial Defense.Rushil Anirudh; Jayaraman J. Thiagarajan; Bhavya Kailkhura; Timo Bremer Intermediate Level Adversarial Attack for Enhanced Transferability.Qian Huang; Zeqi Gu; Isay Katsman; Horace He; Pian Pawakapan; Zhiqiu Lin; Serge Belongie; Ser-Nam Lim Lightweight Lipschitz Margin Training for Certified Defense against Adversarial Examples.Hajime Ono; Tsubasa Takahashi; Kazuya Kakizaki Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition.Jenn-Bing Ong; Wee-Keong Ng; C. -C. Jay Kuo 2018-11-19 Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding.Yao Li; Martin Renqiang Min; Wenchao Yu; Cho-Jui Hsieh; Thomas C. M. Lee; Erik Kruus 2018-11-18 Generalizable Adversarial Training via Spectral Normalization.Farzan Farnia; Jesse M. Zhang; David Tse The Taboo Trap: Behavioural Detection of Adversarial Samples.Ilia Shumailov; Yiren Zhao; Robert Mullins; Ross Anderson Regularized adversarial examples for model interpretability.Yoel Shoshan; Vadim Ratner 2018-11-17 DeepConsensus: using the consensus of features from multiple layers to attain robust image classification.Yuchen Li; Safwan Hossain; Kiarash Jamali; Frank Rudzicz Classifiers Based on Deep Sparse Coding Architectures are Robust to Deep Learning Transferable Examples.Jacob M. Springer; Charles S. Strauss; Austin M. Thresher; Edward Kim; Garrett T. Kenyon Boosting the Robustness Verification of DNN by Identifying the Achilles's Heel.Chengdong Feng; Zhenbang Chen; Weijiang Hong; Hengbiao Yu; Wei Dong; Ji Wang 2018-11-16 Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues.Yuan Gong; Christian Poellabauer DARCCC: Detecting Adversaries by Reconstruction from Class Conditional Capsules.Nicholas Frosst; Sara Sabour; Geoffrey Hinton 2018-11-15 A Spectral View of Adversarially Robust Features.Shivam Garg; Vatsal Sharan; Brian Hu Zhang; Gregory Valiant A note on hyperparameters in black-box adversarial examples.Jamie Hayes Mathematical Analysis of Adversarial Attacks.Zehao Dou; Stanley J. Osher; Bao Wang Adversarial Examples from Cryptographic Pseudo-Random Generators.Sébastien Bubeck; Yin Tat Lee; Eric Price; Ilya Razenshteyn 2018-11-14 Verification of Recurrent Neural Networks Through Rule Extraction.Qinglong Wang; Kaixuan Zhang; Xue Liu; C. Lee Giles Robustness of spectral methods for community detection.Ludovic Stephan; Laurent Massoulié 2018-11-13 Deep Q learning for fooling neural networks.Mandar Kulkarni 2018-11-08 Universal Decision-Based Black-Box Perturbations: Breaking Security-Through-Obscurity Defenses.Thomas A. Hogan; Bhavya Kailkhura New CleverHans Feature: Better Adversarial Robustness Evaluations with Attack Bundling.Ian Goodfellow A Geometric Perspective on the Transferability of Adversarial Directions.Zachary Charles; Harrison Rosenberg; Dimitris Papailiopoulos 2018-11-07 CAAD 2018: Iterative Ensemble Adversarial Attack.Jiayang Liu; Weiming Zhang; Nenghai Yu AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning.Florian Tramèr; Pascal Dupré; Gili Rusak; Giancarlo Pellegrino; Dan Boneh 2018-11-06 MixTrain: Scalable Training of Verifiably Robust Neural Networks.Shiqi Wang; Yizheng Chen; Ahmed Abdou; Suman Jana SparseFool: a few pixels make a big difference.Apostolos Modas; Seyed-Mohsen Moosavi-Dezfooli; Pascal Frossard 2018-11-05 Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls.Yi Shi; Yalin E. Sagduyu; Kemal Davaslioglu; Jason H. Li FUNN: Flexible Unsupervised Neural Network.David Vigouroux; Sylvain Picard On the Transferability of Adversarial Examples Against CNN-Based Image Forensics.Mauro Barni; Kassem Kallas; Ehsan Nowroozi; Benedetta Tondi 2018-11-04 FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning.Faiq Khalid; Muhammmad Abdullah Hanif; Semeen Rehman; Junaid Qadir; Muhammad Shafique SSCNets: A Selective Sobel Convolution-based Technique to Enhance the Robustness of Deep Neural Networks against Security Attacks.Hammad Tariq; Hassan Ali; Muhammad Abdullah Hanif; Faiq Khalid; Semeen Rehman; Rehan Ahmed; Muhammad Shafique QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks.Hassan Ali; Hammad Tariq; Muhammad Abdullah Hanif; Faiq Khalid; Semeen Rehman; Rehan Ahmed; Muhammad Shafique 2018-11-03 Adversarial Gain.Peter Henderson; Koustuv Sinha; Rosemary Nan Ke; Joelle Pineau CAAD 2018: Powerful None-Access Black-Box Attack Based on Adversarial Transformation Network.Xiaoyi Dong; Weiming Zhang; Nenghai Yu Learning to Defense by Learning to Attack.Haoming Jiang; Zhehui Chen; Yuyang Shi; Bo Dai; Tuo Zhao Adversarial Black-Box Attacks on Automatic Speech Recognition Systems using Multi-Objective Evolutionary Optimization.Shreya Khare; Rahul Aralikatte; Senthil Mani 2018-11-02 A Marauder's Map of Security and Privacy in Machine Learning.Nicolas Papernot Semidefinite relaxations for certifying robustness to adversarial examples.Aditi Raghunathan; Jacob Steinhardt; Percy Liang TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks.Faiq Khalid; Muhammad Abdullah Hanif; Semeen Rehman; Rehan Ahmed; Muhammad Shafique Efficient Neural Network Robustness Certification with General Activation Functions.Huan Zhang; Tsui-Wei Weng; Pin-Yu Chen; Cho-Jui Hsieh; Luca Daniel Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks.Davide Maiorca; Battista Biggio; Giorgio Giacinto 2018-11-01 Improving Adversarial Robustness by Encouraging Discriminative Features.Chirag Agarwal; Anh Nguyen; Dan Schonfeld On the Geometry of Adversarial Examples.Marc Khoury; Dylan Hadfield-Menell Excessive Invariance Causes Adversarial Vulnerability.Jörn-Henrik Jacobsen; Jens Behrmann; Richard Zemel; Matthias Bethge 2018-10-31 When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers.Yujia Wang; David J. Miller; George Kesidis Reversible Adversarial Examples.Jiayang Liu; Dongdong Hou; Weiming Zhang; Nenghai Yu 2018-10-30 Improved Network Robustness with Adversary Critic.Alexander Matyasko; Lap-Pui Chau On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models.Sven Gowal; Krishnamurthy Dvijotham; Robert Stanforth; Rudy Bunel; Chongli Qin; Jonathan Uesato; Relja Arandjelovic; Timothy Mann; Pushmeet Kohli 2018-10-29 Adversarial Risk and Robustness: General Definitions and Implications for the Uniform Distribution.Dimitrios I. Diochnos; Saeed Mahloujifar; Mohammad Mahmoody Logit Pairing Methods Can Fool Gradient-Based Attacks.Marius Mosbach; Maksym Andriushchenko; Thomas Trost; Matthias Hein; Dietrich Klakow 2018-10-28 Rademacher Complexity for Adversarially Robust Generalization.Dong Yin; Kannan Ramchandran; Peter Bartlett RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications.Huan Zhang; Pengchuan Zhang; Cho-Jui Hsieh Robust Audio Adversarial Example for a Physical Attack.Hiromu Yakura; Jun Sakuma 2018-10-27 Towards Robust Deep Neural Networks.Timothy E. Wang; Yiming Gu; Dhagash Mehta; Xiaojun Zhao; Edgar A. Bernal Regularization Effect of Fast Gradient Sign Method and its Generalization.Chandler Zuo 2018-10-26 Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples.Guanhong Tao; Shiqing Ma; Yingqi Liu; Xiangyu Zhang 2018-10-25 Law and Adversarial Machine Learning.Ram Shankar Siva Kumar; David R. O'Brien; Kendra Albert; Salome Vilojen Attack Graph Convolutional Networks by Adding Fake Nodes.Xiaoyun Wang; Minyhao Cheng; Joe Eaton; Cho-Jui Hsieh; Felix Wu Evading classifiers in discrete domains with provable optimality guarantees.Bogdan Kulynych; Jamie Hayes; Nikita Samarin; Carmela Troncoso 2018-10-24 Robust Adversarial Learning via Sparsifying Front Ends.Soorya Gopalakrishnan; Zhinus Marzi; Upamanyu Madhow; Ramtin Pedarsani 2018-10-23 Stochastic Substitute Training: A Gray-box Approach to Craft Adversarial Examples Against Gradient Obfuscation Defenses.Mohammad Hashemi; Greg Cusack; Eric Keller One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy.Jingkang Wang; Ruoxi Jia; Gerald Friedland; Bo Li; Costas Spanos Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors.Yanzi Zhu; Zhujun Xiao; Yuxin Chen; Zhijing Li; Max Liu; Ben Y. Zhao; Haitao Zheng 2018-10-22 Adversarial Risk Bounds via Function Transformation.Justin Khim; Po-Ling Loh Cost-Sensitive Robustness against Adversarial Examples.Xiao Zhang; David Evans Sparse DNNs with Improved Adversarial Robustness.Yiwen Guo; Chao Zhang; Changshui Zhang; Yurong Chen 2018-10-19 On Extensions of CLEVER: A Neural Network Robustness Evaluation Algorithm.Tsui-Wei Weng; Huan Zhang; Pin-Yu Chen; Aurelie Lozano; Cho-Jui Hsieh; Luca Daniel 2018-10-18 Exploring Adversarial Examples in Malware Detection.Octavian Suciu; Scott E. Coull; Jeffrey Johns A Training-based Identification Approach to VIN Adversarial Examples.Yingdi Wang; Wenjia Niu; Tong Chen; Yingxiao Xiang; Jingjing Liu; Gang Li; Jiqiang Liu 2018-10-17 Provable Robustness of ReLU networks via Maximization of Linear Regions.Francesco University of Tübingen Croce; Maksym Saarland University Andriushchenko; Matthias University of Tübingen Hein 2018-10-16 Projecting Trouble: Light Based Adversarial Attacks on Deep Learning Classifiers.Nicole Nichols; Robert Jasper Security Matters: A Survey on Adversarial Machine Learning.Guofu Li; Pengjia Zhu; Jin Li; Zhemin Yang; Ning Cao; Zhiyi Chen 2018-10-15 Concise Explanations for Neural Networks using Adversarial Training.Prasad Chalasani; Jiefeng Chen; Somesh Jha; Xi Wu 2018-10-11 Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation.Chaowei Xiao; Ruizhi Deng; Bo Li; Fisher Yu; Mingyan Liu; Dawn Song MeshAdv: Adversarial Meshes for Visual Recognition.Chaowei Xiao; Dawei Yang; Bo Li; Jia Deng; Mingyan Liu 2018-10-09 Is PGD-Adversarial Training Necessary? Alternative Training via a Soft-Quantization Network with Noisy-Natural Samples Only.Tianhang Zheng; Changyou Chen; Kui Ren Analyzing the Noise Robustness of Deep Neural Networks.Mengchen Liu; Shixia Liu; Hang Su; Kelei Cao; Jun Zhu The Adversarial Attack and Detection under the Fisher Information Metric.Chenxiao Zhao; P. Thomas Fletcher; Mixue Yu; Yaxin Peng; Guixu Zhang; Chaomin Shen 2018-10-08 Limitations of adversarial robustness: strong No Free Lunch Theorem.Elvis Dohmatob Average Margin Regularization for Classifiers.Matt Olfat; Anil Aswani Efficient Two-Step Adversarial Defense for Deep Neural Networks.Ting-Jui Chang; Yukun He; Peng Li Combinatorial Attacks on Binarized Neural Networks.Elias B. Khalil; Amrita Gupta; Bistra Dilkina 2018-10-04 Improved Generalization Bounds for Robust Learning.Idan Attias; Aryeh Kontorovich; Yishay Mansour Feature Prioritization and Regularization Improve Standard Accuracy and Adversarial Robustness.Chihuang Liu; Joseph JaJa 2018-10-02 Can Adversarially Robust Learning Leverage Computational Hardness?.Saeed Mahloujifar; Mohammad Mahmoody Adversarial Examples - A Complete Characterisation of the Phenomenon.Alexandru Constantin Serban; Erik Poll; Joost Visser Link Prediction Adversarial Attack.Jinyin Chen; Ziqiang Shi; Yangyang Wu; Xuanheng Xu; Haibin Zheng 2018-10-01 Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network.Xuanqing Liu; Yao Li; Chongruo Wu; Cho-Jui Hsieh Large batch size training of neural networks with adversarial training and second-order information.Zhewei Yao; Amir Gholami; Kurt Keutzer; Michael Mahoney Improving the Generalization of Adversarial Training with Domain Adaptation.Chuanbiao Song; Kun He; Liwei Wang; John E. Hopcroft Improved robustness to adversarial examples using Lipschitz regularization of the loss.Chris Finlay; Adam Oberman; Bilal Abbasi 2018-09-30 Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Neural Networks.Kenneth T. Co; Luis Muñoz-González; Emil C. Lupu 2018-09-29 CAAD 2018: Generating Transferable Adversarial Examples.Yash Sharma; Tien-Dung Le; Moustafa Alzantot To compress or not to compress: Understanding the Interactions between Adversarial Attacks and Neural Network Compression.Yiren Zhao; Ilia Shumailov; Robert Mullins; Ross Anderson Interpreting Adversarial Robustness: A View from Decision Surface in Input Space.Fuxun Yu; Chenchen Liu; Yanzhi Wang; Liang Zhao; Xiang Chen 2018-09-28 Characterizing Audio Adversarial Examples Using Temporal Dependency.Zhuolin Yang; Bo Li; Pin-Yu Chen; Dawn Song Adversarial Attacks and Defences: A Survey.Anirban Chakraborty; Manaar Alam; Vishal Dey; Anupam Chattopadhyay; Debdeep Mukhopadhyay Explainable Black-Box Attacks Against Model-based Authentication.Washington Garcia; Joseph I. Choi; Suman K. Adari; Somesh Jha; Kevin R. B. Butler 2018-09-26 Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward.Muhammad Usama; Junaid Qadir; Ala Al-Fuqaha 2018-09-24 Neural Networks with Structural Resistance to Adversarial Attacks.Alfaro Luca de Fast Geometrically-Perturbed Adversarial Faces.Ali Dabouei; Sobhan Soleymani; Jeremy Dawson; Nasser M. Nasrabadi On The Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces.Chia-Yi Hsu; Pei-Hsuan Lu; Pin-Yu Chen; Chia-Mu Yu Low Frequency Adversarial Perturbation.Chuan Guo; Jared S. Frank; Kilian Q. Weinberger 2018-09-23 Is Ordered Weighted $\ell_1$ Regularized Regression Robust to Adversarial Perturbation? A Case Study on OSCAR.Pin-Yu Chen; Bhanukiran Vinzamuri; Sijia Liu 2018-09-22 Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization.Bao Wang; Alex T. Lin; Zuoqiang Shi; Wei Zhu; Penghang Yin; Andrea L. Bertozzi; Stanley J. Osher 2018-09-21 Unrestricted Adversarial Examples.Tom B. Brown; Nicholas Carlini; Chiyuan Zhang; Catherine Olsson; Paul Christiano; Ian Goodfellow Adversarial Binaries for Authorship Identification.Xiaozhu Meng; Barton P. Miller; Somesh Jha 2018-09-20 Playing the Game of Universal Adversarial Perturbations.Julien Perolat; Mateusz Malinowski; Bilal Piot; Olivier Pietquin 2018-09-19 Efficient Formal Safety Analysis of Neural Networks.Shiqi Wang; Kexin Pei; Justin Whitehouse; Junfeng Yang; Suman Jana Adversarial Training Towards Robust Multimedia Recommender System.Jinhui Tang; Xiaoyu Du; Xiangnan He; Fajie Yuan; Qi Tian; Tat-Seng Chua Generating 3D Adversarial Point Clouds.Chong Xiang; Charles R. Qi; Bo Li 2018-09-17 HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples.Deqiang Li; Ramesh Baral; Tao Li; Han Wang; Qianmu Li; Shouhuai Xu Robustness Guarantees for Bayesian Inference with Gaussian Processes.Luca Cardelli; Marta Kwiatkowska; Luca Laurenti; Andrea Patane 2018-09-16 Exploring the Vulnerability of Single Shot Module in Object Detectors via Imperceptible Background Patches.Yuezun Li; Xiao Bian; Ming-ching Chang; Siwei Lyu Robust Adversarial Perturbation on Deep Proposal-based Models.Yuezun Li; Daniel Tian; Ming-Ching Chang; Xiao Bian; Siwei Lyu 2018-09-13 Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks.Siyue Wang; Xiao Wang; Pu Zhao; Wujie Wen; David Kaeli; Peter Chin; Xue Lin Query-Efficient Black-Box Attack by Active Learning.Pengcheng Li; Jinfeng Yi; Lijun Zhang Adversarial Examples: Opportunities and Challenges.Jiliang Zhang; Chen Li 2018-09-11 On the Structural Sensitivity of Deep Convolutional Networks to the Directions of Fourier Basis Functions.Yusuke Tsuzuku; Issei Sato Isolated and Ensemble Audio Preprocessing Methods for Detecting Adversarial Examples against Automatic Speech Recognition.Krishan Rajaratnam; Kunal Shah; Jugal Kalita Humans can decipher adversarial images.Zhenglong Zhou; Chaz Firestone 2018-09-09 The Curse of Concentration in Robust Learning: Evasion and Poisoning Attacks from Concentration of Measure.Saeed Mahloujifar; Dimitrios I. Diochnos; Mohammad Mahmoody Training for Faster Adversarial Robustness Verification via Inducing ReLU Stability.Kai Y. Xiao; Vincent Tjeng; Nur Muhammad Shafiullah; Aleksander Madry Certified Adversarial Robustness with Additive Noise.Bai Li; Changyou Chen; Wenlin Wang; Lawrence Carin 2018-09-08 Towards Query Efficient Black-box Attacks: An Input-free Perspective.Yali Du; Meng Fang; Jinfeng Yi; Jun Cheng; Dacheng Tao Fast Gradient Attack on Network Embedding.Jinyin Chen; Yangyang Wu; Xuanheng Xu; Yixian Chen; Haibin Zheng; Qi Xuan Structure-Preserving Transformation: Generating Diverse and Transferable Adversarial Examples.Dan Peng; Zizhan Zheng; Xiaofeng Zhang Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks.Ambra Demontis; Marco Melis; Maura Pintor; Matthew Jagielski; Battista Biggio; Alina Oprea; Cristina Nita-Rotaru; Fabio Roli 2018-09-07 Open Set Adversarial Examples.Zhedong Zheng; Liang Zheng; Zhilan Hu; Yi Yang A Deeper Look at 3D Shape Classifiers.Jong-Chyi Su; Matheus Gadelha; Rui Wang; Subhransu Maji Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer.Alvin Chan; Lei Ma; Felix Juefei-Xu; Xiaofei Xie; Yang Liu; Yew Soon Ong Trick Me If You Can: Human-in-the-loop Generation of Adversarial Examples for Question Answering.Eric Wallace; Pedro Rodriguez; Shi Feng; Ikuya Yamada; Jordan Boyd-Graber 2018-09-06 Are adversarial examples inevitable?.Ali Shafahi; W. Ronny Huang; Christoph Studer; Soheil Feizi; Tom Goldstein Adversarial Over-Sensitivity and Over-Stability Strategies for Dialogue Models.Tong Niu; Mohit Bansal IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection.Zilong Lin; Yong Shi; Zhi Xue Adversarial Reprogramming of Text Classification Neural Networks.Paarth Neekhara; Shehzeen Hussain; Shlomo Dubnov; Farinaz Koushanfar 2018-09-05 Bridging machine learning and cryptography in defence against adversarial attacks.Olga Taran; Shideh Rezaeifar; Slava Voloshynovskiy 2018-09-04 Adversarial Attacks on Node Embeddings.Aleksandar Bojchevski; Stephan Günnemann 2018-09-03 HASP: A High-Performance Adaptive Mobile Security Enhancement Against Malicious Speech Recognition.Zirui Xu; Fuxun Yu; Chenchen Liu; Xiang Chen Adversarial Attack Type I: Cheat Classifiers by Significant Changes.Sanli Tang; Xiaolin Huang; Mingjian Chen; Chengjin Sun; Jie Yang 2018-08-31 MULDEF: Multi-model-based Defense Against Adversarial Examples for Neural Networks.Siwakorn Srisakaokul; Yuhao Zhang; Zexuan Zhong; Wei Yang; Tao Xie; Bo Li 2018-08-28 DLFuzz: Differential Fuzzing Testing of Deep Learning Systems.Jianmin Guo; Yu Jiang; Yue Zhao; Quan Chen; Jiaguang Sun All You Need is "Love": Evading Hate-speech Detection.Tommi Gröndahl; Luca Pajola; Mika Juuti; Mauro Conti; N. Asokan Lipschitz regularized Deep Neural Networks generalize and are adversarially robust.Chris Finlay; Jeff Calder; Bilal Abbasi; Adam Oberman 2018-08-27 Targeted Nonlinear Adversarial Perturbations in Images and Videos.Roberto Rey-de-Castro; Herschel Rabitz Generalisation in humans and deep neural networks.Robert Geirhos; Carlos R. Medina Temme; Jonas Rauber; Heiko H. Schütt; Matthias Bethge; Felix A. Wichmann 2018-08-26 Adversarially Regularising Neural NLI Models to Integrate Logical Background Knowledge.Pasquale Minervini; Sebastian Riedel 2018-08-25 Guiding Deep Learning System Testing using Surprise Adequacy.Jinhan Kim; Robert Feldt; Shin Yoo Analysis of adversarial attacks against CNN-based image forgery detectors.Diego Gragnaniello; Francesco Marra; Giovanni Poggi; Luisa Verdoliva 2018-08-24 Is Machine Learning in Power Systems Vulnerable?.Yize Chen; Yushi Tan; Deepjyoti Deka 2018-08-23 Maximal Jacobian-based Saliency Map Attack.Rey Wiyatno; Anqi Xu Adversarial Attacks on Deep-Learning Based Radio Signal Classification.Meysam Sadeghi; Erik G. Larsson 2018-08-20 Controlling Over-generalization and its Effect on Adversarial Examples Generation and Detection.Mahdieh Abbasi; Arezoo Rajabi; Azadeh Sadat Mozafari; Rakesh B. Bobba; Christian Gagne Stochastic Combinatorial Ensembles for Defending Against Adversarial Examples.George A. Adam; Petr Smirnov; David Duvenaud; Benjamin Haibe-Kains; Anna Goldenberg 2018-08-17 Reinforcement Learning for Autonomous Defence in Software-Defined Networking.Yi Han; Benjamin I. P. Rubinstein; Tamas Abraham; Tansu Alpcan; Vel Olivier De; Sarah Erfani; David Hubczenko; Christopher Leckie; Paul Montague 2018-08-16 Mitigation of Adversarial Attacks through Embedded Feature Selection.Ziyi Bao; Luis Muñoz-González; Emil C. Lupu Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding.Lea Schönherr; Katharina Kohls; Steffen Zeiler; Thorsten Holz; Dorothea Kolossa Distributionally Adversarial Attack.Tianhang Zheng; Changyou Chen; Kui Ren 2018-08-10 Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection.Xiao Chen; Chaoran Li; Derui Wang; Sheng Wen; Jun Zhang; Surya Nepal; Yang Xiang; Kui Ren Using Randomness to Improve Robustness of Machine-Learning Models Against Evasion Attacks.Fan Yang; Zhiyuan Chen 2018-08-08 Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer.Hsueh-Ti Derek Liu; Michael Tao; Chun-Liang Li; Derek Nowrouzezahrai; Alec Jacobson 2018-08-07 Data augmentation using synthetic data for time series classification with deep residual networks.Hassan Ismail Fawaz; Germain Forestier; Jonathan Weber; Lhassane Idoumghar; Pierre-Alain Muller 2018-08-06 Adversarial Vision Challenge.Wieland Brendel; Jonas Rauber; Alexey Kurakin; Nicolas Papernot; Behar Veliqi; Marcel Salathé; Sharada P. Mohanty; Matthias Bethge Defense Against Adversarial Attacks with Saak Transform.Sibo Song; Yueru Chen; Ngai-Man Cheung; C. -C. Jay Kuo Gray-box Adversarial Training.Vivek B. S.; Konda Reddy Mopuri; R. Venkatesh Babu 2018-08-05 Is Robustness the Cost of Accuracy? -- A Comprehensive Study on the Robustness of 18 Deep Image Classification Models.Dong Su; Huan Zhang; Hongge Chen; Jinfeng Yi; Pin-Yu Chen; Yupeng Gao Structured Adversarial Attack: Towards General Implementation and Better Interpretability.Kaidi Xu; Sijia Liu; Pu Zhao; Pin-Yu Chen; Huan Zhang; Quanfu Fan; Deniz Erdogmus; Yanzhi Wang; Xue Lin 2018-08-04 Traits & Transferability of Adversarial Examples against Instance Segmentation & Object Detection.Raghav Gurbaxani; Shivank Mishra ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples.Xinbo Liu; Jiliang Zhang; Yapin Lin; He Li 2018-08-03 DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes.Mehmet Sinan Inci; Thomas Eisenbarth; Berk Sunar Ask, Acquire, and Attack: Data-free UAP Generation using Class Impressions.Konda Reddy Mopuri; Phani Krishna Uppala; R. Venkatesh Babu 2018-07-31 EagleEye: Attack-Agnostic Defense against Adversarial Inputs (Technical Report).Yujie Ji; Xinyang Zhang; Ting Wang 2018-07-27 Rob-GAN: Generator, Discriminator, and Adversarial Attacker.Xuanqing Liu; Cho-Jui Hsieh 2018-07-26 A general metric for identifying adversarial images.Siddharth Krishna Kumar Evaluating and Understanding the Robustness of Adversarial Logit Pairing.Logan Engstrom; Andrew Ilyas; Anish Athalye 2018-07-25 HiDDeN: Hiding Data With Deep Networks.Jiren Zhu; Russell Kaplan; Justin Johnson; Li Fei-Fei Limitations of the Lipschitz constant as a defense against adversarial examples.Todd Huster; Cho-Yu Jason Chiang; Ritu Chadha Unbounded Output Networks for Classification.Stefan Elfwing; Eiji Uchibe; Kenji Doya 2018-07-24 Learning Discriminative Video Representations Using Adversarial Perturbations.Jue Wang; Anoop Cherian 2018-07-21 Simultaneous Adversarial Training - Learn from Others Mistakes.Zukang Liao 2018-07-20 Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors.Andrew Ilyas; Logan Engstrom; Aleksander Madry Physical Adversarial Examples for Object Detectors.Kevin Eykholt; Ivan Evtimov; Earlence Fernandes; Bo Li; Amir Rahmati; Florian Tramer; Atul Prakash; Tadayoshi Kohno; Dawn Song 2018-07-18 Harmonic Adversarial Attack Method.Wen Heng; Shuchang Zhou; Tingting Jiang 2018-07-17 Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding.Tong Chen; Wenjia Niu; Yingxiao Xiang; Xiaoxuan Bai; Jiqiang Liu; Zhen Han; Gang Li Motivating the Rules of the Game for Adversarial Example Research.Justin Gilmer; Ryan P. Adams; Ian Goodfellow; David Andersen; George E. Dahl Defend Deep Neural Networks Against Adversarial Examples via Fixed andDynamic Quantized Activation Functions.Adnan Siraj Rakin; Jinfeng Yi; Boqing Gong; Deliang Fan 2018-07-16 Online Robust Policy Learning in the Presence of Unknown Adversaries.Aaron J. Havens; Zhanhong Jiang; Soumik Sarkar Manifold Adversarial Learning.Shufei Zhang; Kaizhu Huang; Jianke Zhu; Yang Liu 2018-07-12 Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach.Minhao Cheng; Thong Le; Pin-Yu Chen; Jinfeng Yi; Huan Zhang; Cho-Jui Hsieh 2018-07-11 With Friends Like These, Who Needs Adversaries?.Saumya Jetley; Nicholas A. Lord; Philip H. S. Torr 2018-07-10 A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks.Kimin Lee; Kibok Lee; Honglak Lee; Jinwoo Shin A Game-Based Approximate Verification of Deep Neural Networks with Provable Guarantees.Min Wu; Matthew Wicker; Wenjie Ruan; Xiaowei Huang; Marta Kwiatkowska Attack and defence in cellular decision-making: lessons from machine learning.Thomas J. Rademaker; Emmanuel Bengio; Paul François 2018-07-09 Adaptive Adversarial Attack on Scene Text Recognition.Xiaoyong Yuan; Pan He; Xiaolin Andy Li 2018-07-08 Vulnerability Analysis of Chest X-Ray Image Classification Against Adversarial Attacks.Saeid Asgari Taghanaki; Arkadeep Das; Ghassan Hamarneh 2018-07-05 Implicit Generative Modeling of Random Noise during Training for Adversarial Robustness.Priyadarshini Panda; Kaushik Roy 2018-07-04 Benchmarking Neural Network Robustness to Common Corruptions and Surface Variations.Dan Hendrycks; Thomas G. Dietterich 2018-07-03 Local Gradients Smoothing: Defense against localized adversarial attacks.Muzammal Naseer; Salman H. Khan; Fatih Porikli Adversarial Robustness Toolbox v1.0.0.Maria-Irina Nicolae; Mathieu Sinn; Minh Ngoc Tran; Beat Buesser; Ambrish Rawat; Martin Wistuba; Valentina Zantedeschi; Nathalie Baracaldo; Bryant Chen; Heiko Ludwig; Ian M. Molloy; Ben Edwards 2018-07-02 Adversarial Perturbations Against Real-Time Video Classification Systems.Shasha Li; Ajaya Neupane; Sujoy Paul; Chengyu Song; Srikanth V. Krishnamurthy; Amit K. Roy Chowdhury; Ananthram Swami 2018-07-01 Towards Adversarial Training with Moderate Performance Improvement for Neural Network Classification.Xinhan Di; Pengqian Yu; Meng Tian 2018-06-29 Adversarial Examples in Deep Learning: Characterization and Divergence.Wenqi Wei; Ling Liu; Margaret Loper; Stacey Truex; Lei Yu; Mehmet Emre Gursoy; Yanzhao Wu 2018-06-28 Adversarial Reprogramming of Neural Networks.Gamaleldin F. Elsayed; Ian Goodfellow; Jascha Sohl-Dickstein 2018-06-27 Gradient Similarity: An Explainable Approach to Detect Adversarial Attacks against Deep Learning.Jasjeet Dhaliwal; Saurabh Shintre Customizing an Adversarial Example Generator with Class-Conditional GANs.Shih-hong Tsai 2018-06-25 Exploring Adversarial Examples: Patterns of One-Pixel Attacks.David Kügler; Alexander Distergoft; Arjan Kuijper; Anirban Mukhopadhyay 2018-06-23 Defending Malware Classification Networks Against Adversarial Perturbations with Non-Negative Weight Restrictions.Alex Kouzemtchenko On Adversarial Examples for Character-Level Neural Machine Translation.Javid Ebrahimi; Daniel Lowd; Dejing Dou Evaluation of Momentum Diverse Input Iterative Fast Gradient Sign Method (M-DI2-FGSM) Based Attack Method on MCS 2018 Adversarial Attacks on Black Box Face Recognition System.Md Ashraful Alam Milton 2018-06-21 Detection based Defense against Adversarial Examples from the Steganalysis Point of View.Jiayang Liu; Weiming Zhang; Yiwei Zhang; Dongdong Hou; Yujia Liu; Hongyue Zha; Nenghai Yu 2018-06-20 Gradient Adversarial Training of Neural Networks.Ayan Sinha; Zhao Chen; Vijay Badrinarayanan; Andrew Rabinovich Combinatorial Testing for Deep Learning Systems.Lei Ma; Fuyuan Zhang; Minhui Xue; Bo Li; Yang Liu; Jianjun Zhao; Yadong Wang 2018-06-19 On the Learning of Deep Local Features for Robust Face Spoofing Detection.Souza Gustavo Botelho de; João Paulo Papa; Aparecido Nilceu Marana Built-in Vulnerabilities to Imperceptible Adversarial Perturbations.Thomas Tanay; Jerone T. A. Andrews; Lewis D. Griffin 2018-06-15 Non-Negative Networks Against Adversarial Attacks.William Fleshman; Edward Raff; Jared Sylvester; Steven Forsyth; Mark McLean 2018-06-14 Copycat CNN: Stealing Knowledge by Persuading Confession with Random Non-Labeled Data.Jacson Rodrigues Correia-Silva; Rodrigo F. Berriel; Claudine Badue; Souza Alberto F. de; Thiago Oliveira-Santos 2018-06-13 Hierarchical interpretations for neural network predictions.Chandan Singh; W. James Murdoch; Bin Yu Manifold Mixup: Better Representations by Interpolating Hidden States.Vikas Verma; Alex Lamb; Christopher Beckham; Amir Najafi; Ioannis Mitliagkas; Aaron Courville; David Lopez-Paz; Yoshua Bengio 2018-06-12 Adversarial Attacks on Variational Autoencoders.George Gondim-Ribeiro; Pedro Tabacof; Eduardo Valle Ranking Robustness Under Adversarial Document Manipulations.Gregory Goren; Oren Kurland; Moshe Tennenholtz; Fiana Raiber 2018-06-11 Defense Against the Dark Arts: An overview of adversarial example security research and future research directions.Ian Goodfellow 2018-06-08 Monge blunts Bayes: Hardness Results for Adversarial Training.Zac Cranko; Aditya Krishna Menon; Richard Nock; Cheng Soon Ong; Zhan Shi; Christian Walder 2018-06-07 Revisiting Adversarial Risk.Arun Sai Suggala; Adarsh Prasad; Vaishnavh Nagarajan; Pradeep Ravikumar Training Augmentation with Adversarial Examples for Robust Speech Recognition.Sining Sun; Ching-Feng Yeh; Mari Ostendorf; Mei-Yuh Hwang; Lei Xie 2018-06-06 Adversarial Attack on Graph Structured Data.Hanjun Dai; Hui Li; Tian Tian; Xin Huang; Lin Wang; Jun Zhu; Le Song Adversarial Regression with Multiple Learners.Liang Tong; Sixie Yu; Scott Alfeld; Yevgeniy Vorobeychik Killing Four Birds with one Gaussian Process: Analyzing Test-Time Attack Vectors on Classification.Kathrin Grosse; Michael T. Smith; Michael Backes 2018-06-05 DPatch: An Adversarial Patch Attack on Object Detectors.Xin Liu; Huanrui Yang; Ziwei Liu; Linghao Song; Hai Li; Yiran Chen 2018-06-04 Mitigation of Policy Manipulation Attacks on Deep Q-Networks with Parameter-Space Noise.Vahid Behzadan; Arslan Munir An Explainable Adversarial Robustness Metric for Deep Learning Neural Networks.Chirag Agarwal; Bo Dong; Dan Schonfeld; Anthony Hoogs PAC-learning in the presence of evasion adversaries.Daniel Cullina; Arjun Nitin Bhagoji; Prateek Mittal 2018-06-02 Sufficient Conditions for Idealised Models to Have No Adversarial Examples: a Theoretical and Empirical Study with Bayesian Neural Networks.Yarin Gal; Lewis Smith Detecting Adversarial Examples via Key-based Network.Pinlong Zhao; Zhouyu Fu; Ou wu; Qinghua Hu; Jun Wang 2018-05-31 PeerNets: Exploiting Peer Wisdom Against Adversarial Attacks.Jan Svoboda; Jonathan Masci; Federico Monti; Michael M. Bronstein; Leonidas Guibas Resisting Adversarial Attacks using Gaussian Mixture Variational Autoencoders.Partha Ghosh; Arpan Losalka; Michael J Black Scaling provable adversarial defenses.Eric Wong; Frank R. Schmidt; Jan Hendrik Metzen; J. Zico Kolter Sequential Attacks on Agents for Long-Term Adversarial Goals.Edgar Tretschk; Seong Joon Oh; Mario Fritz Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data.Puyudi Yang; Jianbo Chen; Cho-Jui Hsieh; Jane-Ling Wang; Michael I. Jordan 2018-05-30 Adversarial Attacks on Face Detectors using Neural Net based Constrained Optimization.Avishek Joey Bose; Parham Aarabi ADAGIO: Interactive Experimentation with Adversarial Attack and Defense for Audio.Nilaksh Das; Madhuri Shanbhogue; Shang-Tse Chen; Li Chen; Michael E. Kounavis; Duen Horng Chau Robustifying Models Against Adversarial Attacks by Langevin Dynamics.Vignesh Srinivasan; Arturo Marban; Klaus-Robert Müller; Wojciech Samek; Shinichi Nakajima Robustness May Be at Odds with Accuracy.Dimitris Tsipras; Shibani Santurkar; Logan Engstrom; Alexander Turner; Aleksander Madry 2018-05-29 AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks.Chun-Chen Tu; Paishun Ting; Pin-Yu Chen; Sijia Liu; Huan Zhang; Jinfeng Yi; Cho-Jui Hsieh; Shin-Ming Cheng Adversarial Noise Attacks of Deep Learning Architectures -- Stability Analysis via Sparse Modeled Signals.Yaniv Romano; Aviad Aberdam; Jeremias Sulam; Michael Elad Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization.Salman Salamatian; Wasim Huleihel; Ahmad Beirami; Asaf Cohen; Muriel Médard 2018-05-28 Adversarial Examples in Remote Sensing.Wojciech Czaja; Neil Fendley; Michael Pekala; Christopher Ratto; I-Jeng Wang GenAttack: Practical Black-box Attacks with Gradient-Free Optimization.Moustafa Alzantot; Yash Sharma; Supriyo Chakraborty; Huan Zhang; Cho-Jui Hsieh; Mani Srivastava 2018-05-27 Defending Against Adversarial Attacks by Leveraging an Entire GAN.Gokula Krishnan Santhanam; Paulina Grnarova 2018-05-25 Training verified learners with learned verifiers.Krishnamurthy Dvijotham; Sven Gowal; Robert Stanforth; Relja Arandjelovic; Brendan O'Donoghue; Jonathan Uesato; Pushmeet Kohli Adversarial examples from computational constraints.Sébastien Bubeck; Eric Price; Ilya Razenshteyn 2018-05-24 Laplacian Networks: Bounding Indicator Function Smoothness for Neural Network Robustness.Carlos Eduardo Rosar Kos Lassance; Vincent Gripon; Antonio Ortega 2018-05-23 Anonymizing k-Facial Attributes via Adversarial Perturbations.Saheb Chhabra; Richa Singh; Mayank Vatsa; Gaurav Gupta Towards Robust Training of Neural Networks by Regularizing Adversarial Gradients.Fuxun Yu; Zirui Xu; Yanzhi Wang; Chenchen Liu; Xiang Chen Towards the first adversarially robust neural network model on MNIST.Lukas Schott; Jonas Rauber; Matthias Bethge; Wieland Brendel 2018-05-22 Adversarially Robust Training through Structured Gradient Regularization.Kevin Roth; Aurelien Lucchi; Sebastian Nowozin; Thomas Hofmann 2018-05-21 Adversarial Noise Layer: Regularize Neural Network By Adding Noise.Zhonghui You; Jinmian Ye; Kunming Li; Zenglin Xu; Ping Wang Adversarial Attacks on Neural Networks for Graph Data.Daniel Zügner; Amir Akbarnejad; Stephan Günnemann Constructing Unrestricted Adversarial Examples with Generative Models.Yang Song; Rui Shu; Nate Kushman; Stefano Ermon Bidirectional Learning for Robust Neural Networks.Sidney Pontes-Filho; Marcus Liwicki 2018-05-20 Featurized Bidirectional GAN: Adversarial Defense via Adversarially Learned Semantic Inference.Ruying Bao; Sihang Liang; Qingcan Wang Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks.Jiefeng Chen; Xi Wu; Vaibhav Rastogi; Yingyu Liang; Somesh Jha Targeted Adversarial Examples for Black Box Audio Systems.Rohan Taori; Amog Kamsetty; Brenton Chu; Nikita Vemuri 2018-05-17 Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models.Pouya Samangouei; Maya Kabkab; Rama Chellappa 2018-05-16 Towards Robust Neural Machine Translation.Yong Cheng; Zhaopeng Tu; Fandong Meng; Junjie Zhai; Yang Liu 2018-05-14 Detecting Adversarial Samples for Deep Neural Networks through Mutation Testing.Jingyi Wang; Jun Sun; Peixin Zhang; Xinyu Wang 2018-05-12 AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.Jinyuan Jia; Neil Zhenqiang Gong Curriculum Adversarial Training.Qi-Zhi Cai; Min Du; Chang Liu; Dawn Song 2018-05-11 Breaking Transferability of Adversarial Samples with Randomness.Yan Zhou; Murat Kantarcioglu; Bowei Xi 2018-05-09 On Visual Hallmarks of Robustness to Adversarial Malware.Alex Huang; Abdullah Al-Dujaili; Erik Hemberg; Una-May O'Reilly Robust Classification with Convolutional Prototype Learning.Hong-Ming Yang; Xu-Yao Zhang; Fei Yin; Cheng-Lin Liu 2018-05-08 Interpretable Adversarial Perturbation in Input Embedding Space for Text.Motoki Sato; Jun Suzuki; Hiroyuki Shindo; Yuji Matsumoto 2018-05-05 A Counter-Forensic Method for CNN-Based Camera Model Identification.David Güera; Yu Wang; Luca Bondi; Paolo Bestagini; Stefano Tubaro; Edward J. Delp 2018-05-03 Siamese networks for generating adversarial examples.Mandar Kulkarni; Aria Abubakar 2018-04-30 Concolic Testing for Deep Neural Networks.Youcheng Sun; Min Wu; Wenjie Ruan; Xiaowei Huang; Marta Kwiatkowska; Daniel Kroening How Robust are Deep Neural Networks?.Biswa Sengupta; Karl J. Friston Adversarially Robust Generalization Requires More Data.Ludwig Schmidt; Shibani Santurkar; Dimitris Tsipras; Kunal Talwar; Aleksander Mądry 2018-04-29 Adversarial Regression for Detecting Attacks in Cyber-Physical Systems.Amin Ghafouri; Yevgeniy Vorobeychik; Xenofon Koutsoukos 2018-04-28 Formal Security Analysis of Neural Networks using Symbolic Intervals.Shiqi Wang; Kexin Pei; Justin Whitehouse; Junfeng Yang; Suman Jana 2018-04-25 Towards Fast Computation of Certified Robustness for ReLU Networks.Tsui-Wei Weng; Huan Zhang; Hongge Chen; Zhao Song; Cho-Jui Hsieh; Duane Boning; Inderjit S. Dhillon; Luca Daniel 2018-04-23 Towards Dependable Deep Convolutional Neural Networks (CNNs) with Out-distribution Learning.Mahdieh Abbasi; Arezoo Rajabi; Christian Gagné; Rakesh B. Bobba Siamese Generative Adversarial Privatizer for Biometric Data.Witold Oleszkiewicz; Peter Kairouz; Karol Piczak; Ram Rajagopal; Tomasz Trzcinski Black-box Adversarial Attacks with Limited Queries and Information.Andrew Ilyas; Logan Engstrom; Anish Athalye; Jessy Lin VectorDefense: Vectorization as a Defense to Adversarial Examples.Vishaal Munusamy Kabilan; Brandon Morris; Anh Nguyen Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers.Ishai Rosenberg; Asaf Shabtai; Yuval Elovici; Lior Rokach 2018-04-21 Generating Natural Language Adversarial Examples.Moustafa Alzantot; Yash Sharma; Ahmed Elgohary; Bo-Jhang Ho; Mani Srivastava; Kai-Wei Chang 2018-04-20 Gradient Masking Causes CLEVER to Overestimate Adversarial Perturbation Size.Ian Goodfellow Learning More Robust Features with Adversarial Training.Shuangtao Li; Yuanke Chen; Yanlin Peng; Lin Bai ADef: an Iterative Algorithm to Construct Adversarial Deformations.Rima Alaifari; Giovanni S. Alberti; Tandri Gauksson 2018-04-19 Attacking Convolutional Neural Network using Differential Evolution.Jiawei Su; Danilo Vasconcellos Vargas; Kouichi Sakurai Semantic Adversarial Deep Learning.Tommaso Dreossi; Somesh Jha; Sanjit A. Seshia 2018-04-18 Simulation-based Adversarial Test Generation for Autonomous Vehicles with Machine Learning Components.Cumhur Erkan Tuncali; Georgios Fainekos; Hisahiro Ito; James Kapinski Neural Automated Essay Scoring and Coherence Modeling for Adversarially Crafted Input.Youmna Farag; Helen Yannakoudakis; Ted Briscoe 2018-04-17 Robust Machine Comprehension Models via Adversarial Training.Yicheng Wang; Mohit Bansal Adversarial Example Generation with Syntactically Controlled Paraphrase Networks.Mohit Iyyer; John Wieting; Kevin Gimpel; Luke Zettlemoyer 2018-04-16 Global Robustness Evaluation of Deep Neural Networks with Provable Guarantees for the $L_0$ Norm.Wenjie Ruan; Min Wu; Youcheng Sun; Xiaowei Huang; Daniel Kroening; Marta Kwiatkowska ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector.Shang-Tse Chen; Cory Cornelius; Jason Martin; Duen Horng Chau 2018-04-14 On the Limitation of MagNet Defense against $L_1$-based Adversarial Examples.Pei-Hsuan Lu; Pin-Yu Chen; Kang-Cheng Chen; Chia-Mu Yu Adversarial Attacks Against Medical Deep Learning Systems.Samuel G. Finlayson; Hyung Won Chung; Isaac S. Kohane; Andrew L. Beam 2018-04-11 Detecting Malicious PowerShell Commands using Deep Neural Networks.Danny Hendler; Shay Kels; Amir Rubin 2018-04-10 On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses.Anish Athalye; Nicholas Carlini 2018-04-09 Adversarial Training Versus Weight Decay.Angus Galloway; Thomas Tanay; Graham W. Taylor An ADMM-Based Universal Framework for Adversarial Attacks on Deep Neural Networks.Pu Zhao; Sijia Liu; Yanzhi Wang; Xue Lin 2018-04-08 Adaptive Spatial Steganography Based on Probability-Controlled Adversarial Examples.Sai Ma; Qingxiao Guan; Xianfeng Zhao; Yaqi Liu 2018-04-06 Fortified Networks: Improving the Robustness of Deep Networks by Modeling the Manifold of Hidden Representations.Alex Lamb; Jonathan Binas; Anirudh Goyal; Dmitriy Serdyuk; Sandeep Subramanian; Ioannis Mitliagkas; Yoshua Bengio 2018-04-04 Unifying Bilateral Filtering and Adversarial Training for Robust Neural Networks.Neale Ratzlaff; Li Fuxin 2018-03-30 Adversarial Attacks and Defences Competition.Alexey Kurakin; Ian Goodfellow; Samy Bengio; Yinpeng Dong; Fangzhou Liao; Ming Liang; Tianyu Pang; Jun Zhu; Xiaolin Hu; Cihang Xie; Jianyu Wang; Zhishuai Zhang; Zhou Ren; Alan Yuille; Sangxia Huang; Yao Zhao; Yuzhe Zhao; Zhonglin Han; Junjiajia Long; Yerkebulan Berdibekov; Takuya Akiba; Seiya Tokui; Motoki Abe 2018-03-29 Security Consideration For Deep Learning-Based Image Forensics.Wei Zhao; Pengpeng Yang; Rongrong Ni; Yao Zhao; Haorui Wu 2018-03-28 Defending against Adversarial Images using Basis Functions Transformations.Uri Shaham; James Garritano; Yutaro Yamada; Ethan Weinberger; Alex Cloninger; Xiuyuan Cheng; Kelly Stanton; Yuval Kluger The Effects of JPEG and JPEG2000 Compression on Attacks using Adversarial Examples.Ayse Elvan Aydemir; Alptekin Temizel; Tugba Taskaya Temizel 2018-03-26 Bypassing Feature Squeezing by Increasing Adversary Strength.Yash Sharma; Pin-Yu Chen On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples.Pei-Hsuan Lu; Pin-Yu Chen; Chia-Mu Yu Clipping free attacks against artificial neural networks.Boussad Addad; Jerome Kodjabachian; Christophe Meyer 2018-03-24 Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks.Tegjyot Singh Sethi; Mehmed Kantardzic; Joung Woo Ryu A Dynamic-Adversarial Mining Approach to the Security of Machine Learning.Tegjyot Singh Sethi; Mehmed Kantardzic; Lingyu Lyua; Jiashun Chen An Overview of Vulnerabilities of Voice Controlled Systems.Yuan Gong; Christian Poellabauer 2018-03-23 Generalizability vs. Robustness: Adversarial Examples for Medical Imaging.Magdalini Paschali; Sailesh Conjeti; Fernando Navarro; Nassir Navab CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography.Weixuan Tang; Bin Li; Shunquan Tan; Mauro Barni; Jiwu Huang Detecting Adversarial Perturbations with Saliency.Chiliang Zhang; Zhimou Yang; Zuochang Ye Improving DNN Robustness to Adversarial Attacks using Jacobian Regularization.Daniel Jakubovitz; Raja Giryes 2018-03-22 Understanding Measures of Uncertainty for Adversarial Example Detection.Lewis Smith; Yarin Gal 2018-03-21 Adversarial Defense based on Structure-to-Signal Autoencoders.Joachim Folz; Sebastian Palacio; Joern Hees; Damian Borth; Andreas Dengel Task-specific Deep LDA pruning of neural networks.Qing Tian; Tal Arbel; James J. Clark 2018-03-20 DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems.Lei Ma; Felix Juefei-Xu; Fuyuan Zhang; Jiyuan Sun; Minhui Xue; Bo Li; Chunyang Chen; Ting Su; Li Li; Yang Liu; Jianjun Zhao; Yadong Wang 2018-03-19 Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks.Octavian Suciu; Radu Mărginean; Yiğitcan Kaya; Hal III Daumé; Tudor Dumitraş Improving Transferability of Adversarial Examples with Input Diversity.Cihang Xie; Zhishuai Zhang; Yuyin Zhou; Song Bai; Jianyu Wang; Zhou Ren; Alan Yuille 2018-03-17 A Dual Approach to Scalable Verification of Deep Networks.Dj Krishnamurthy; Dvijotham; Robert Stanforth; Sven Gowal; Timothy Mann; Pushmeet Kohli 2018-03-16 Adversarial Logit Pairing.Harini Kannan; Alexey Kurakin; Ian Goodfellow Semantic Adversarial Examples.Hossein Hosseini; Radha Poovendran 2018-03-15 Large Margin Deep Networks for Classification.Gamaleldin F. Elsayed; Dilip Krishnan; Hossein Mobahi; Kevin Regan; Samy Bengio 2018-03-13 Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples.Zihao Liu; Qi Liu; Tao Liu; Nuo Xu; Xue Lin; Yanzhi Wang; Wujie Wen Defending against Adversarial Attack towards Deep Neural Networks via Collaborative Multi-task Training.Derek Wang; Chaoran Li; Sheng Wen; Surya Nepal; Yang Xiang Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust Deep Learning.Nicolas Papernot; Patrick McDaniel Invisible Mask: Practical Attacks on Face Recognition with Infrared.Zhe Zhou; Di Tang; Xiaofeng Wang; Weili Han; Xiangyu Liu; Kehuan Zhang 2018-03-12 Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables.Bojan Kolosnjaji; Ambra Demontis; Battista Biggio; Davide Maiorca; Giorgio Giacinto; Claudia Eckert; Fabio Roli 2018-03-10 Combating Adversarial Attacks Using Sparse Representations.Soorya Gopalakrishnan; Zhinus Marzi; Upamanyu Madhow; Ramtin Pedarsani Detecting Adversarial Examples via Neural Fingerprinting.Sumanth Dathathri; Stephan Zheng; Tianwei Yin; Richard M. Murray; Yisong Yue 2018-03-09 Detecting Adversarial Examples - A Lesson from Multimedia Forensics.Pascal Schöttle; Alexander Schlögl; Cecilia Pasquini; Rainer Böhme On Generation of Adversarial Examples using Convex Programming.Emilio Rafael Balda; Arash Behboodi; Rudolf Mathar Explaining Black-box Android Malware Detection.Marco Melis; Davide Maiorca; Battista Biggio; Giorgio Giacinto; Fabio Roli 2018-03-08 Rethinking Feature Distribution for Loss Functions in Image Classification.Weitao Wan; Yuanyi Zhong; Tianpeng Li; Jiansheng Chen 2018-03-07 Sparse Adversarial Perturbations for Videos.Xingxing Wei; Jun Zhu; Hang Su 2018-03-04 Stochastic Activation Pruning for Robust Adversarial Defense.Guneet S. Dhillon; Kamyar Azizzadenesheli; Zachary C. Lipton; Jeremy Bernstein; Jean Kossaifi; Aran Khanna; Anima Anandkumar 2018-03-03 Seq2Sick: Evaluating the Robustness of Sequence-to-Sequence Models with Adversarial Examples.Minhao Cheng; Jinfeng Yi; Huan Zhang; Pin-Yu Chen; Cho-Jui Hsieh 2018-03-02 Protecting JPEG Images Against Adversarial Attacks.Aaditya Prakash; Nick Moran; Solomon Garber; Antonella DiLillo; James Storer 2018-02-26 Understanding and Enhancing the Transferability of Adversarial Examples.Lei Wu; Zhanxing Zhu; Cheng Tai; Weinan E On the Suitability of $L_p$-norms for Creating and Preventing Adversarial Examples.Mahmood Sharif; Lujo Bauer; Michael K. Reiter Retrieval-Augmented Convolutional Neural Networks for Improved Robustness against Adversarial Examples.Jake Zhao; Kyunghyun Cho Max-Mahalanobis Linear Discriminant Analysis Networks.Tianyu Pang; Chao Du; Jun Zhu 2018-02-23 Deep Defense: Training DNNs with Improved Adversarial Robustness.Ziang Yan; Yiwen Guo; Changshui Zhang Sensitivity and Generalization in Neural Networks: an Empirical Study.Roman Novak; Yasaman Bahri; Daniel A. Abolafia; Jeffrey Pennington; Jascha Sohl-Dickstein Adversarial vulnerability for any classifier.Alhussein Fawzi; Hamza Fawzi; Omar Fawzi Verifying Controllers Against Adversarial Examples with Bayesian Optimization.Shromona Ghosh; Felix Berkenkamp; Gireeja Ranade; Shaz Qadeer; Ashish Kapoor 2018-02-22 Unravelling Robustness of Deep Learning based Face Recognition Against Adversarial Attacks.Gaurav Goswami; Nalini Ratha; Akshay Agarwal; Richa Singh; Mayank Vatsa Hessian-based Analysis of Large Batch Training and Robustness to Adversaries.Zhewei Yao; Amir Gholami; Qi Lei; Kurt Keutzer; Michael W. Mahoney Adversarial Examples that Fool both Computer Vision and Time-Limited Humans.Gamaleldin F. Elsayed; Shreya Shankar; Brian Cheung; Nicolas Papernot; Alex Kurakin; Ian Goodfellow; Jascha Sohl-Dickstein 2018-02-21 Adversarial Training for Probabilistic Spiking Neural Networks.Alireza Bagheri; Osvaldo Simeone; Bipin Rajendran L2-Nonexpansive Neural Networks.Haifeng Qian; Mark N. Wegman Generalizable Adversarial Examples Detection Based on Bi-model Decision Mismatch.João Monteiro; Isabela Albuquerque; Zahid Akhtar; Tiago H. Falk 2018-02-20 Attack Strength vs. Detectability Dilemma in Adversarial Machine Learning.Christopher Frederickson; Michael Moore; Glenn Dawson; Robi Polikar Out-distribution training confers robustness to deep neural networks.Mahdieh Abbasi; Christian Gagné 2018-02-19 On Lyapunov exponents and adversarial perturbation.Vinay Uday Prabhu; Nishant Desai; John Whaley Shield: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression.Nilaksh Das; Madhuri Shanbhogue; Shang-Tse Chen; Fred Hohman; Siwei Li; Li Chen; Michael E. Kounavis; Duen Horng Chau Divide, Denoise, and Defend against Adversarial Attacks.Seyed-Mohsen Moosavi-Dezfooli; Ashish Shrivastava; Oncel Tuzel Robustness of Rotation-Equivariant Networks to Adversarial Perturbations.Beranger Dumont; Simona Maggio; Pablo Montalvo Are Generative Classifiers More Robust to Adversarial Attacks?.Yingzhen Li; John Bradshaw; Yash Sharma 2018-02-18 DARTS: Deceiving Autonomous Cars with Toxic Signs.Chawin Sitawarin; Arjun Nitin Bhagoji; Arsalan Mosenia; Mung Chiang; Prateek Mittal 2018-02-15 ASP:A Fast Adversarial Attack Example Generation Framework based on Adversarial Saliency Prediction.Fuxun Yu; Qide Dong; Xiang Chen Adversarial Risk and the Dangers of Evaluating Against Weak Attacks.Jonathan Uesato; Brendan O'Donoghue; Aaron van den Oord; Pushmeet Kohli 2018-02-14 Fooling OCR Systems with Adversarial Text Images.Congzheng Song; Vitaly Shmatikov Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks.Qi Liu; Tao Liu; Zihao Liu; Yanzhi Wang; Yier Jin; Wujie Wen 2018-02-13 Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints.Di Tang; XiaoFeng Wang; Kehuan Zhang Identify Susceptible Locations in Medical Records via Adversarial Attacks on Deep Predictive Models.Mengying Sun; Fengyi Tang; Jinfeng Yi; Fei Wang; Jiayu Zhou Deceiving End-to-End Deep Learning Malware Detectors using Adversarial Examples.Felix Kreuk; Assi Barak; Shir Aviv-Reuven; Moran Baruch; Benny Pinkas; Joseph Keshet 2018-02-12 Lipschitz-Margin Training: Scalable Certification of Perturbation Invariance for Deep Neural Networks.Yusuke Tsuzuku; Issei Sato; Masashi Sugiyama Predicting Adversarial Examples with High Confidence.Angus Galloway; Graham W. Taylor; Medhat Moussa 2018-02-09 Certified Robustness to Adversarial Examples with Differential Privacy.Mathias Lecuyer; Vaggelis Atlidakis; Roxana Geambasu; Daniel Hsu; Suman Jana 2018-02-08 Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection.Andrea Paudice; Luis Muñoz-González; Andras Gyorgy; Emil C. Lupu 2018-02-05 Blind Pre-Processing: A Robust Defense Method Against Adversarial Examples.Adnan Siraj Rakin; Zhezhi He; Boqing Gong; Deliang Fan First-order Adversarial Vulnerability of Neural Networks and Input Dimension.Carl-Johann Simon-Gabriel; Yann Ollivier; Léon Bottou; Bernhard Schölkopf; David Lopez-Paz 2018-02-02 Secure Detection of Image Manipulation by means of Random Feature Selection.Zhipeng Chen; Benedetta Tondi; Xiaolong Li; Rongrong Ni; Yao Zhao; Mauro Barni Hardening Deep Neural Networks via Adversarial Model Cascades.Deepak Vijaykeerthy; Anshuman Suri; Sameep Mehta; Ponnurangam Kumaraguru 2018-02-01 Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples.Anish Athalye; Nicholas Carlini; David Wagner 2018-01-31 Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach.Tsui-Wei Weng; Huan Zhang; Pin-Yu Chen; Jinfeng Yi; Dong Su; Yupeng Gao; Cho-Jui Hsieh; Luca Daniel 2018-01-29 Robustness of classification ability of spiking neural networks.Jie Yang; Pingping Zhang; Yan Liu 2018-01-28 Certified Defenses against Adversarial Examples.Aditi Raghunathan; Jacob Steinhardt; Percy Liang 2018-01-27 Towards an Understanding of Neural Networks in Natural-Image Spaces.Yifei Fan; Anthony Yezzi 2018-01-26 Deflecting Adversarial Attacks with Pixel Deflection.Aaditya Prakash; Nick Moran; Solomon Garber; Antonella DiLillo; James Storer Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning.Hyrum S. Anderson; Anant Kharkar; Bobby Filar; David Evans; Phil Roth 2018-01-24 CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.Xuejing Yuan; Yuxuan Chen; Yue Zhao; Yunhui Long; Xiaokang Liu; Kai Chen; Shengzhi Zhang; Heqing Huang; Xiaofeng Wang; Carl A. Gunter Generalizable Data-free Objective for Crafting Universal Adversarial Perturbations.Konda Reddy Mopuri; Aditya Ganeshan; R. Venkatesh Babu 2018-01-22 Adversarial Texts with Gradient Methods.Zhitao Gong; Wenlu Wang; Bo Li; Dawn Song; Wei-Shinn Ku 2018-01-15 A Comparative Study of Rule Extraction for Recurrent Neural Networks.Qinglong Wang; Kaixuan Zhang; Alexander G. II Ororbia; Xinyu Xing; Xue Liu; C. Lee Giles Sparsity-based Defense against Adversarial Attacks on Linear Classifiers.Zhinus Marzi; Soorya Gopalakrishnan; Upamanyu Madhow; Ramtin Pedarsani Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks.Bo Luo; Yannan Liu; Lingxiao Wei; Qiang Xu 2018-01-12 Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers.Ji Gao; Jack Lanchantin; Mary Lou Soffa; Yanjun Qi 2018-01-11 A3T: Adversarially Augmented Adversarial Training.Akram Erraqabi; Aristide Baratin; Yoshua Bengio; Simon Lacoste-Julien 2018-01-10 Fooling End-to-end Speaker Verification by Adversarial Examples.Felix Kreuk; Yossi Adi; Moustapha Cisse; Joseph Keshet 2018-01-09 Adversarial Deep Learning for Robust Detection of Binary Encoded Malware.Abdullah Al-Dujaili; Alex Huang; Erik Hemberg; Una-May O'Reilly Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks.Yongshuai Liu; Jiyu Chen; Hao Chen 2018-01-08 Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos.Chawin Sitawarin; Arjun Nitin Bhagoji; Arsalan Mosenia; Prateek Mittal; Mung Chiang Adversarial Spheres.Justin Gilmer; Luke Metz; Fartash Faghri; Samuel S. Schoenholz; Maithra Raghu; Martin Wattenberg; Ian Goodfellow Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality.Xingjun Ma; Bo Li; Yisen Wang; Sarah M. Erfani; Sudanthi Wijewickrema; Grant Schoenebeck; Dawn Song; Michael E. Houle; James Bailey Spatially Transformed Adversarial Examples.Chaowei Xiao; Jun-Yan Zhu; Bo Li; Warren He; Mingyan Liu; Dawn Song Generating Adversarial Examples with Adversarial Networks.Chaowei Xiao; Bo Li; Jun-Yan Zhu; Warren He; Mingyan Liu; Dawn Song LaVAN: Localized and Visible Adversarial Noise.Danny Karmon; Daniel Zoran; Yoav Goldberg Attacking Speaker Recognition With Deep Generative Models.Wilson Cai; Anish Doshi; Rafael Valle HeNet: A Deep Learning Approach on Intel$^\circledR$ Processor Trace for Effective Exploit Detection.Li Chen; Salmin Sultana; Ravi Sahita 2018-01-07 Denoising Dictionary Learning Against Adversarial Perturbations.John Mitro; Derek Bridge; Steven Prestwich 2018-01-05 Adversarial Perturbation Intensity Achieving Chosen Intra-Technique Transferability Level for Logistic Regression.Martin Gubri Audio Adversarial Examples: Targeted Attacks on Speech-to-Text.Nicholas Carlini; David Wagner Shielding Google's language toxicity model against adversarial attacks.Nestor Rodriguez; Sergio Rojas-Galeano 2018-01-03 Facial Attributes: Accuracy and Adversarial Robustness.Andras Rozsa; Manuel Günther; Ethan M. Rudd; Terrance E. Boult Neural Networks in Adversarial Setting and Ill-Conditioned Weight Space.Mayank Singh; Abhishek Sinha; Balaji Krishnamurthy 2018-01-02 High Dimensional Spaces, Deep Learning and Adversarial Examples.Simant Dube Did you hear that? Adversarial Examples Against Automatic Speech Recognition.Moustafa Alzantot; Bharathan Balaji; Mani Srivastava Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey.Naveed Akhtar; Ajmal Mian 2017-12-31 A General Framework for Adversarial Examples with Objectives.Mahmood Sharif; Sruti Bhagavatula; Lujo Bauer; Michael K. Reiter 2017-12-28 Gradient Regularization Improves Accuracy of Discriminative Models.Dániel Varga; Adrián Csiszárik; Zsolt Zombori 2017-12-27 Adversarial Patch.Tom B. Brown; Dandelion Mané; Aurko Roy; Martín Abadi; Justin Gilmer 2017-12-26 Exploring the Space of Black-box Attacks on Deep Neural Networks.Arjun Nitin Bhagoji; Warren He; Bo Li; Dawn Song Building Robust Deep Neural Networks for Road Sign Detection.Arkar Min Aung; Yousef Fadila; Radian Gondokaryono; Luis Gonzalez The Robust Manifold Defense: Adversarial Training using Generative Models.Ajil Jalal; Andrew Ilyas; Constantinos Daskalakis; Alexandros G. Dimakis 2017-12-24 Android Malware Detection using Deep Learning on API Method Sequences.ElMouatez Billah Karbab; Mourad Debbabi; Abdelouahid Derhab; Djedjiga Mouheb 2017-12-23 Whatever Does Not Kill Deep Reinforcement Learning, Makes It Stronger.Vahid Behzadan; Arslan Munir 2017-12-22 Query-limited Black-box Attacks to Classifiers.Fnu Suya; Yuan Tian; David Evans; Paolo Papotti 2017-12-21 Using LIP to Gloss Over Faces in Single-Stage Face Detection Networks.Siqi Yang; Arnold Wiliem; Shaokang Chen; Brian C. Lovell ReabsNet: Detecting and Revising Adversarial Examples.Jiefeng Chen; Zihang Meng; Changtian Sun; Wei Tang; Yinglun Zhu Note on Attacking Object Detectors with Adversarial Stickers.Kevin Eykholt; Ivan Evtimov; Earlence Fernandes; Bo Li; Dawn Song; Tadayoshi Kohno; Amir Rahmati; Atul Prakash; Florian Tramer Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications.Qixue Xiao; Kang Li; Deyue Zhang; Yier Jin 2017-12-19 Query-Efficient Black-box Adversarial Examples (superceded).Andrew Ilyas; Logan Engstrom; Anish Athalye; Jessy Lin Adversarial Examples: Attacks and Defenses for Deep Learning.Xiaoyong Yuan; Pan He; Qile Zhu; Xiaolin Li 2017-12-18 HotFlip: White-Box Adversarial Examples for Text Classification.Javid Ebrahimi; Anyi Rao; Daniel Lowd; Dejing Dou When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time.David J. Miller; Yulia Wang; George Kesidis 2017-12-17 Deep Neural Networks as 0-1 Mixed Integer Linear Programs: A Feasibility Study.Matteo Fischetti; Jason Jo Super-sparse Learning in Similarity Spaces.Ambra Demontis; Marco Melis; Battista Biggio; Giorgio Fumera; Fabio Roli 2017-12-16 Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Classification Models.Jack W. Stokes; De Wang; Mady Marinescu; Marc Marino; Brian Bussone 2017-12-14 DANCin SEQ2SEQ: Fooling Text Classifiers with Adversarial Text Example Generation.Catherine Wong 2017-12-12 Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models.Wieland Brendel; Jonas Rauber; Matthias Bethge 2017-12-11 Training Ensembles to Detect Adversarial Examples.Alexander Bagnall; Razvan Bunescu; Gordon Stewart 2017-12-10 Robust Deep Reinforcement Learning with Adversarial Attacks.Anay Pattanaik; Zhenyi Tang; Shuijing Liu; Gautham Bommannan; Girish Chowdhary 2017-12-09 NAG: Network for Adversary Generation.Konda Reddy Mopuri; Utkarsh Ojha; Utsav Garg; R. Venkatesh Babu 2017-12-08 Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning.Battista Biggio; Fabio Roli Defense against Adversarial Attacks Using High-Level Representation Guided Denoiser.Fangzhou Liao; Ming Liang; Yinpeng Dong; Tianyu Pang; Xiaolin Hu; Jun Zhu 2017-12-07 Adversarial Examples that Fool Detectors.Jiajun Lu; Hussein Sibai; Evan Fabry Exploring the Landscape of Spatial Robustness.Logan Engstrom; Brandon Tran; Dimitris Tsipras; Ludwig Schmidt; Aleksander Madry 2017-12-06 Generative Adversarial Perturbations.Omid Poursaeed; Isay Katsman; Bicheng Gao; Serge Belongie Attacking Visual Language Grounding with Adversarial Examples: A Case Study on Neural Image Captioning.Hongge Chen; Huan Zhang; Pin-Yu Chen; Jinfeng Yi; Cho-Jui Hsieh 2017-12-05 Towards Practical Verification of Machine Learning: The Case of Computer Vision Systems.Kexin Pei; Yinzhi Cao; Junfeng Yang; Suman Jana 2017-12-02 Improving Network Robustness against Adversarial Attacks with Compact Convolution.Rajeev Ranjan; Swami Sankaranarayanan; Carlos D. Castillo; Rama Chellappa Towards Robust Neural Networks via Random Self-ensemble.Xuanqing Liu; Minhao Cheng; Huan Zhang; Cho-Jui Hsieh Where Classification Fails, Interpretation Rises.Chanh Nguyen; Georgi Georgiev; Yujie Ji; Ting Wang 2017-11-30 Measuring the tendency of CNNs to Learn Surface Statistical Regularities.Jason Jo; Yoshua Bengio 2017-11-27 Adversary Detection in Neural Networks via Persistent Homology.Thomas Gebhart; Paul Schrater On the Robustness of Semantic Segmentation Models to Adversarial Attacks.Anurag Arnab; Ondrej Miksik; Philip H. S. Torr Butterfly Effect: Bidirectional Control of Classification Performance by Small Additive Perturbation.YoungJoon Yoo; Seonguk Park; Junyoung Choi; Sangdoo Yun; Nojun Kwak 2017-11-26 Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing their Input Gradients.Andrew Slavin Ross; Finale Doshi-Velez 2017-11-24 Geometric robustness of deep networks: analysis and improvement.Can Kanbak; Seyed-Mohsen Moosavi-Dezfooli; Pascal Frossard 2017-11-22 Safer Classification by Synthesis.William Wang; Angelina Wang; Aviv Tamar; Xi Chen; Pieter Abbeel MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples.Nicholas Carlini; David Wagner Adversarial Phenomenon in the Eyes of Bayesian Deep Learning.Ambrish Rawat; Martin Wistuba; Maria-Irina Nicolae 2017-11-21 Reinforcing Adversarial Robustness using Model Confidence Induced by Adversarial Training.Xi Wu; Uyeong Jang; Jiefeng Chen; Lingjiao Chen; Somesh Jha 2017-11-20 Evaluating Robustness of Neural Networks with Mixed Integer Programming.Vincent Tjeng; Kai Xiao; Russ Tedrake Adversarial Attacks Beyond the Image Space.Xiaohui Zeng; Chenxi Liu; Yu-Siang Wang; Weichao Qiu; Lingxi Xie; Yu-Wing Tai; Chi Keung Tang; Alan L. Yuille 2017-11-17 How Wrong Am I? - Studying Adversarial Examples and their Impact on Uncertainty in Gaussian Process Machine Learning Models.Kathrin Grosse; David Pfaff; Michael Thomas Smith; Michael Backes 2017-11-16 Enhanced Attacks on Defensively Distilled Deep Neural Networks.Yujia Liu; Weiming Zhang; Shaohua Li; Nenghai Yu Defense against Universal Adversarial Perturbations.Naveed Akhtar; Jian Liu; Ajmal Mian 2017-11-15 The best defense is a good offense: Countering black box attacks by predicting slightly wrong labels.Yannic Kilcher; Thomas Hofmann 2017-11-12 Machine vs Machine: Minimax-Optimal Defense Against Adversarial Examples.Jihun Hamm; Akshay Mehra 2017-11-09 Crafting Adversarial Examples For Speech Paralinguistics Applications.Yuan Gong; Christian Poellabauer 2017-11-08 Intriguing Properties of Adversarial Examples.Ekin D. Cubuk; Barret Zoph; Samuel S. Schoenholz; Quoc V. Le 2017-11-06 Mitigating Adversarial Effects Through Randomization.Cihang Xie; Jianyu Wang; Zhishuai Zhang; Zhou Ren; Alan Yuille HyperNetworks with statistical filtering for defending adversarial examples.Zhun Sun; Mete Ozay; Takayuki Okatani Towards Reverse-Engineering Black-Box Neural Networks.Seong Joon Oh; Max Augustin; Bernt Schiele; Mario Fritz 2017-11-02 The (Un)reliability of saliency methods.Pieter-Jan Kindermans; Sara Hooker; Julius Adebayo; Maximilian Alber; Kristof T. Schütt; Sven Dähne; Dumitru Erhan; Been Kim Provable defenses against adversarial examples via the convex outer adversarial polytope.Eric Wong; J. Zico Kolter 2017-11-01 Attacking Binarized Neural Networks.Angus Galloway; Graham W. Taylor; Medhat Moussa 2017-10-31 Countering Adversarial Images using Input Transformations.Chuan Guo; Mayank Rana; Moustapha Cisse; der Maaten Laurens van Conditional Variance Penalties and Domain Shift Robustness.Christina Heinze-Deml; Nicolai Meinshausen Generating Natural Adversarial Examples.Zhengli Zhao; Dheeru Dua; Sameer Singh 2017-10-30 PixelDefend: Leveraging Generative Models to Understand and Defend against Adversarial Examples.Yang Song; Taesup Kim; Sebastian Nowozin; Stefano Ermon; Nate Kushman 2017-10-29 Attacking the Madry Defense Model with $L_1$-based Adversarial Examples.Yash Sharma; Pin-Yu Chen Certifying Some Distributional Robustness with Principled Adversarial Training.Aman Sinha; Hongseok Namkoong; John Duchi 2017-10-28 Interpretation of Neural Networks is Fragile.Amirata Ghorbani; Abubakar Abid; James Zou 2017-10-27 Adversarial Detection of Flash Malware: Limitations and Open Issues.Davide Maiorca; Battista Biggio; Maria Elena Chiappe; Giorgio Giacinto 2017-10-25 mixup: Beyond Empirical Risk Minimization.Hongyi Zhang; Moustapha Cisse; Yann N. Dauphin; David Lopez-Paz 2017-10-24 One pixel attack for fooling deep neural networks.Jiawei Su; Danilo Vasconcellos Vargas; Sakurai Kouichi 2017-10-21 Feature-Guided Black-Box Safety Testing of Deep Neural Networks.Matthew Wicker; Xiaowei Huang; Marta Kwiatkowska 2017-10-17 Boosting Adversarial Attacks with Momentum.Yinpeng Dong; Fangzhou Liao; Tianyu Pang; Hang Su; Jun Zhu; Xiaolin Hu; Jianguo Li 2017-10-12 Game-Theoretic Design of Secure and Resilient Distributed Support Vector Machines with Adversaries.Rui Zhang; Quanyan Zhu 2017-10-09 Standard detectors aren't (currently) fooled by physical adversarial stop signs.Jiajun Lu; Hussein Sibai; Evan Fabry; David Forsyth Verification of Binarized Neural Networks via Inter-Neuron Factoring.Chih-Hong Cheng; Georg Nührenberg; Chung-Hao Huang; Harald Ruess 2017-10-02 Detecting Adversarial Attacks on Neural Network Policies with Visual Foresight.Yen-Chen Lin; Ming-Yu Liu; Min Sun; Jia-Bin Huang DeepSafe: A Data-driven Approach for Checking Adversarial Robustness in Neural Networks.Divya Gopinath; Guy Katz; Corina S. Pasareanu; Clark Barrett 2017-09-28 Provably Minimally-Distorted Adversarial Examples.Nicholas Carlini; Guy Katz; Clark Barrett; David L. Dill DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.Ferdinand Technische Universität Darmstadt, Germany Brasser; Srdjan ETH Zurich, Switzerland Capkun; Alexandra University of Würzburg Dmitrienko; Tommaso Technische Universität Darmstadt, Germany Frassetto; Kari ETH Zurich, Switzerland Kostiainen; Ahmad-Reza Technische Universität Darmstadt, Germany Sadeghi 2017-09-26 Output Range Analysis for Deep Neural Networks.Souradeep Dutta; Susmit Jha; Sriram Sanakaranarayanan; Ashish Tiwari 2017-09-25 Fooling Vision and Language Models Despite Localization and Attention Mechanism.Xiaojun Xu; Xinyun Chen; Chang Liu; Anna Rohrbach; Trevor Darrell; Dawn Song 2017-09-19 Verifying Properties of Binarized Deep Neural Networks.Nina Narodytska; Shiva Prasad Kasiviswanathan; Leonid Ryzhyk; Mooly Sagiv; Toby Walsh 2017-09-16 Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification.Xiaoyu Cao; Neil Zhenqiang Gong 2017-09-13 A Learning and Masking Approach to Secure Learning.Linh Nguyen; Sky Wang; Arunesh Sinha Models and Framework for Adversarial Attacks on Complex Adaptive Systems.Vahid Behzadan; Arslan Munir 2017-09-12 EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples.Pin-Yu Chen; Yash Sharma; Huan Zhang; Jinfeng Yi; Cho-Jui Hsieh 2017-09-11 Art of singular vectors and universal adversarial perturbations.Valentin Khrulkov; Ivan Oseledets Ensemble Methods as a Defense to Adversarial Perturbations Against Deep Neural Networks.Thilo Strauss; Markus Hanselmann; Andrej Junginger; Holger Ulmer 2017-09-08 Towards Proving the Adversarial Robustness of Deep Neural Networks.Guy Stanford University Katz; Clark Stanford University Barrett; David L. Stanford University Dill; Kyle Stanford University Julian; Mykel J. Stanford University Kochenderfer DeepFense: Online Accelerated Defense Against Adversarial Deep Learning.Bita Darvish Rouhani; Mohammad Samragh; Mojan Javaheripi; Tara Javidi; Farinaz Koushanfar 2017-09-02 Security Evaluation of Pattern Classifiers under Attack.Battista Biggio; Giorgio Fumera; Fabio Roli 2017-08-31 On Security and Sparsity of Linear Classifiers for Adversarial Settings.Ambra Demontis; Paolo Russu; Battista Biggio; Giorgio Fumera; Fabio Roli Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin.Yujin Kwon; Dohyun Kim; Yunmok Son; Eugene Vasserman; Yongdae Kim 2017-08-29 Practical Attacks Against Graph-based Clustering.Yizheng Chen; Yacin Nadji; Athanasios Kountouras; Fabian Monrose; Roberto Perdisci; Manos Antonakakis; Nikolaos Vasiloglou 2017-08-28 DeepTest: Automated Testing of Deep-Neural-Network-driven Autonomous Cars.Yuchi Tian; Kexin Pei; Suman Jana; Baishakhi Ray Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features.Liang Tong; Bo Li; Chen Hajaj; Chaowei Xiao; Ning Zhang; Yevgeniy Vorobeychik 2017-08-23 Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid.Marco Melis; Ambra Demontis; Battista Biggio; Gavin Brown; Giorgio Fumera; Fabio Roli 2017-08-22 CNN Fixations: An unraveling approach to visualize the discriminative image regions.Konda Reddy Mopuri; Utsav Garg; R. Venkatesh Babu 2017-08-21 Evasion Attacks against Machine Learning at Test Time.Battista Biggio; Igino Corona; Davide Maiorca; Blaine Nelson; Nedim Srndic; Pavel Laskov; Giorgio Giacinto; Fabio Roli 2017-08-17 Towards Interpretable Deep Neural Networks by Leveraging Adversarial Examples.Yinpeng Dong; Hang Su; Jun Zhu; Fan Bao Learning Universal Adversarial Perturbations with Generative Models.Jamie Hayes; George Danezis 2017-08-14 Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API.Hossein Hosseini; Baicen Xiao; Andrew Clark; Radha Poovendran 2017-08-13 ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models.Pin-Yu Chen; Huan Zhang; Yash Sharma; Jinfeng Yi; Cho-Jui Hsieh 2017-08-08 Cascade Adversarial Machine Learning Regularized with a Unified Embedding.Taesik Na; Jong Hwan Ko; Saibal Mukhopadhyay 2017-08-04 Adversarial Robustness: Softmax versus Openmax.Andras Rozsa; Manuel Günther; Terrance E. Boult 2017-08-01 Adversarial-Playground: A Visualization Suite Showing How Adversarial Examples Fool Deep Learning.Andrew P. Norton; Yanjun Qi 2017-07-27 Robust Physical-World Attacks on Deep Learning Models.Kevin Eykholt; Ivan Evtimov; Earlence Fernandes; Bo Li; Amir Rahmati; Chaowei Xiao; Atul Prakash; Tadayoshi Kohno; Dawn Song 2017-07-24 Synthesizing Robust Adversarial Examples.Anish Athalye; Logan Engstrom; Andrew Ilyas; Kevin Kwok 2017-07-23 Adversarial Examples for Evaluating Reading Comprehension Systems.Robin Jia; Percy Liang 2017-07-21 Confidence estimation in Deep Neural networks via density modelling.Akshayvarun Subramanya; Suraj Srinivas; R. Venkatesh Babu 2017-07-20 Efficient Defenses Against Adversarial Attacks.Valentina Zantedeschi; Maria-Irina Nicolae; Ambrish Rawat 2017-07-19 Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.Ishai Rosenberg; Asaf Shabtai; Lior Rokach; Yuval Elovici 2017-07-18 Fast Feature Fool: A data independent approach to universal adversarial perturbations.Konda Reddy Mopuri; Utsav Garg; R. Venkatesh Babu APE-GAN: Adversarial Perturbation Elimination with GAN.Shiwei Shen; Guoqing Jin; Ke Gao; Yongdong Zhang 2017-07-17 Houdini: Fooling Deep Structured Prediction Models.Moustapha Cisse; Yossi Adi; Natalia Neverova; Joseph Keshet 2017-07-13 Foolbox: A Python toolbox to benchmark the robustness of machine learning models.Jonas Rauber; Wieland Brendel; Matthias Bethge 2017-07-11 NO Need to Worry about Adversarial Examples in Object Detection in Autonomous Vehicles.Jiajun Lu; Hussein Sibai; Evan Fabry; David Forsyth A Survey on Resilient Machine Learning.Atul Kumar; Sameep Mehta 2017-07-10 Towards Crafting Text Adversarial Samples.Suranjana Samanta; Sameep Mehta 2017-07-04 UPSET and ANGRI : Breaking High Performance Image Classifiers.Sayantan Sarkar; Ankan Bansal; Upal Mahbub; Rama Chellappa 2017-06-21 Comparing deep neural networks against humans: object recognition when the signal gets weaker.Robert Geirhos; David H. J. Janssen; Heiko H. Schütt; Jonas Rauber; Matthias Bethge; Felix A. Wichmann 2017-06-19 Towards Deep Learning Models Resistant to Adversarial Attacks.Aleksander Madry; Aleksandar Makelov; Ludwig Schmidt; Dimitris Tsipras; Adrian Vladu 2017-06-14 Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong.Warren He; James Wei; Xinyun Chen; Nicholas Carlini; Dawn Song 2017-06-13 Analyzing the Robustness of Nearest Neighbors to Adversarial Examples.Yizhen Wang; Somesh Jha; Kamalika Chaudhuri 2017-06-06 Adversarial-Playground: A Visualization Suite for Adversarial Sample Generation.Andrew Norton; Yanjun Qi 2017-06-02 Towards Robust Detection of Adversarial Examples.Tianyu Pang; Chao Du; Yinpeng Dong; Jun Zhu 2017-05-30 Feature Squeezing Mitigates and Detects Carlini/Wagner Adversarial Examples.Weilin Xu; David Evans; Yanjun Qi 2017-05-27 MAT: A Multi-strength Adversarial Training Method to Mitigate Adversarial Attacks.Chang Song; Hsin-Pai Cheng; Huanrui Yang; Sicheng Li; Chunpeng Wu; Qing Wu; Hai Li; Yiran Chen 2017-05-26 Analysis of universal adversarial perturbations.Seyed-Mohsen Moosavi-Dezfooli; Alhussein Fawzi; Omar Fawzi; Pascal Frossard; Stefano Soatto Classification regions of deep neural networks.Alhussein Fawzi; Seyed-Mohsen Moosavi-Dezfooli; Pascal Frossard; Stefano Soatto 2017-05-25 MagNet: a Two-Pronged Defense against Adversarial Examples.Dongyu Meng; Hao Chen 2017-05-23 Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation.Matthias Hein; Maksym Andriushchenko Detecting Adversarial Image Examples in Deep Networks with Adaptive Noise Reduction.Bin Liang; Hongcheng Li; Miaoqiang Su; Xirong Li; Wenchang Shi; Xiaofeng Wang Black-Box Attacks against RNN based Malware Detection Algorithms.Weiwei Hu; Ying Tan 2017-05-22 Regularizing deep networks using efficient layerwise adversarial training.Swami Sankaranarayanan; Arpit Jain; Rama Chellappa; Ser Nam Lim 2017-05-21 Evading Classifiers by Morphing in the Dark.Hung Dang; Yue Huang; Ee-Chien Chang 2017-05-20 Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods.Nicholas Carlini; David Wagner 2017-05-19 Ensemble Adversarial Training: Attacks and Defenses.Florian Tramèr; Alexey Kurakin; Nicolas Papernot; Ian Goodfellow; Dan Boneh; Patrick McDaniel MTDeep: Boosting the Security of Deep Neural Nets Against Adversarial Attacks with Moving Target Defense.Sailik Sengupta; Tathagata Chakraborti; Subbarao Kambhampati 2017-05-18 DeepXplore: Automated Whitebox Testing of Deep Learning Systems.Kexin Pei; Yinzhi Cao; Junfeng Yang; Suman Jana Delving into adversarial attacks on deep policies.Jernej Kos; Dawn Song 2017-05-15 Extending Defensive Distillation.Nicolas Papernot; Patrick McDaniel 2017-05-09 Generative Adversarial Trainer: Defense to Adversarial Perturbations with GAN.Hyeungill Lee; Sungyeob Han; Jungwoo Lee 2017-05-08 Keeping the Bad Guys Out: Protecting and Vaccinating Deep Learning with JPEG Compression.Nilaksh Das; Madhuri Shanbhogue; Shang-Tse Chen; Fred Hohman; Li Chen; Michael E. Kounavis; Duen Horng Chau 2017-05-05 Detecting Adversarial Samples Using Density Ratio Estimates.Lovedeep Gondara 2017-04-28 Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection.Ambra Demontis; Marco Melis; Battista Biggio; Davide Maiorca; Daniel Arp; Konrad Rieck; Igino Corona; Giorgio Giacinto; Fabio Roli Parseval Networks: Improving Robustness to Adversarial Examples.Moustapha Cisse; Piotr Bojanowski; Edouard Grave; Yann Dauphin; Nicolas Usunier 2017-04-26 Deep Text Classification Can be Fooled.Bin Liang; Hongcheng Li; Miaoqiang Su; Pan Bian; Xirong Li; Wenchang Shi 2017-04-19 Universal Adversarial Perturbations Against Semantic Image Segmentation.Jan Hendrik Metzen; Mummadi Chaithanya Kumar; Thomas Brox; Volker Fischer 2017-04-17 Adversarial and Clean Data Are Not Twins.Zhitao Gong; Wenlu Wang; Wei-Shinn Ku 2017-04-16 Google's Cloud Vision API Is Not Robust To Noise.Hossein Hosseini; Baicen Xiao; Radha Poovendran 2017-04-11 The Space of Transferable Adversarial Examples.Florian Tramèr; Nicolas Papernot; Ian Goodfellow; Dan Boneh; Patrick McDaniel 2017-04-09 Enhancing Robustness of Machine Learning Systems via Data Transformations.Arjun Nitin Bhagoji; Daniel Cullina; Chawin Sitawarin; Prateek Mittal 2017-04-06 Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks.Yi Han; Benjamin I. P. Rubinstein 2017-04-05 Comment on "Biologically inspired protection of deep networks from adversarial attacks".Wieland Brendel; Matthias Bethge 2017-04-04 Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks.Weilin Xu; David Evans; Yanjun Qi 2017-03-31 SafetyNet: Detecting and Rejecting Adversarial Examples Robustly.Jiajun Lu; Theerasit Issaranon; David Forsyth 2017-03-27 Adversarial Transformation Networks: Learning to Generate Adversarial Examples.Shumeet Baluja; Ian Fischer Biologically inspired protection of deep networks from adversarial attacks.Aran Nayebi; Surya Ganguli 2017-03-26 Deceiving Google's Cloud Video Intelligence API Built for Summarizing Videos.Hossein Hosseini; Baicen Xiao; Radha Poovendran 2017-03-24 Adversarial Examples for Semantic Segmentation and Object Detection.Cihang Xie; Jianyu Wang; Zhishuai Zhang; Yuyin Zhou; Lingxi Xie; Alan Yuille 2017-03-23 Self corrective Perturbations for Semantic Segmentation and Classification.Swami Sankaranarayanan; Arpit Jain; Ser Nam Lim 2017-03-22 Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains.Tegjyot Singh Sethi; Mehmed Kantardzic 2017-03-20 On the Limitation of Convolutional Neural Networks in Recognizing Negative Images.Hossein Hosseini; Baicen Xiao; Mayoore Jaiswal; Radha Poovendran 2017-03-16 Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking.Erwin Quiring; Daniel Arp; Konrad Rieck 2017-03-13 Blocking Transferability of Adversarial Examples in Black-Box Learning Systems.Hossein Hosseini; Yize Chen; Sreeram Kannan; Baosen Zhang; Radha Poovendran 2017-03-07 Tactics of Adversarial Attack on Deep Reinforcement Learning Agents.Yen-Chen Lin; Zhang-Wei Hong; Yuan-Hong Liao; Meng-Li Shih; Ming-Yu Liu; Min Sun 2017-03-03 Adversarial Examples for Semantic Image Segmentation.Volker Fischer; Mummadi Chaithanya Kumar; Jan Hendrik Metzen; Thomas Brox 2017-03-02 Compositional Falsification of Cyber-Physical Systems with Machine Learning Components.Tommaso Dreossi; Alexandre Donzé; Sanjit A. Seshia 2017-03-01 Detecting Adversarial Samples from Artifacts.Reuben Feinman; Ryan R. Curtin; Saurabh Shintre; Andrew B. Gardner 2017-02-26 Deceiving Google's Perspective API Built for Detecting Toxic Comments.Hossein Hosseini; Sreeram Kannan; Baosen Zhang; Radha Poovendran 2017-02-22 Robustness to Adversarial Examples through an Ensemble of Specialists.Mahdieh Abbasi; Christian Gagné Adversarial examples for generative models.Jernej Kos; Ian Fischer; Dawn Song DeepCloak: Masking Deep Neural Network Models for Robustness Against Adversarial Samples.Ji Gao; Beilun Wang; Zeming Lin; Weilin Xu; Yanjun Qi 2017-02-21 On the (Statistical) Detection of Adversarial Examples.Kathrin Grosse; Praveen Manoharan; Nicolas Papernot; Michael Backes; Patrick McDaniel 2017-02-20 Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN.Weiwei Hu; Ying Tan 2017-02-14 On Detecting Adversarial Perturbations.Jan Hendrik Metzen; Tim Genewein; Volker Fischer; Bastian Bischoff 2017-02-07 Adversarial Attacks on Neural Network Policies.Sandy Huang; Nicolas Papernot; Ian Goodfellow; Yan Duan; Pieter Abbeel 2017-02-03 Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks.Guy Katz; Clark Barrett; David Dill; Kyle Julian; Mykel Kochenderfer 2017-01-15 Vulnerability of Deep Reinforcement Learning to Policy Induction Attacks.Vahid Behzadan; Arslan Munir 2017-01-04 Dense Associative Memory is Robust to Adversarial Inputs.Dmitry Krotov; John J Hopfield 2016-12-22 Adversarial Examples Detection in Deep Networks with Convolutional Filter Statistics.Xin Li; Fuxin Li 2016-12-19 Simple Black-Box Adversarial Perturbations for Deep Networks.Nina Narodytska; Shiva Prasad Kasiviswanathan 2016-12-05 Learning Adversary-Resistant Deep Neural Networks.Qinglong Wang; Wenbo Guo; Kaixuan Zhang; Alexander G. II Ororbia; Xinyu Xing; Xue Liu; C. Lee Giles 2016-12-01 A Theoretical Framework for Robustness of (Deep) Classifiers against Adversarial Examples.Beilun Wang; Ji Gao; Yanjun Qi Adversarial Images for Variational Autoencoders.Pedro Tabacof; Julia Tavares; Eduardo Valle Deep Variational Information Bottleneck.Alexander A. Alemi; Ian Fischer; Joshua V. Dillon; Kevin Murphy 2016-11-30 Towards Robust Deep Neural Networks with BANG.Andras Rozsa; Manuel Gunther; Terrance E. Boult 2016-11-18 LOTS about Attacking Deep Features.Andras Rozsa; Manuel Günther; Terrance E. Boult 2016-11-15 AdversariaLib: An Open-source Library for the Security Evaluation of Machine Learning Algorithms Under Attack.Igino Corona; Battista Biggio; Davide Maiorca 2016-11-11 Towards the Science of Security and Privacy in Machine Learning.Nicolas Papernot; Patrick McDaniel; Arunesh Sinha; Michael Wellman 2016-11-08 Delving into Transferable Adversarial Examples and Black-box Attacks.Yanpei Liu; Xinyun Chen; Chang Liu; Dawn Song 2016-11-03 Adversarial Machine Learning at Scale.Alexey Kurakin; Ian Goodfellow; Samy Bengio 2016-10-26 Universal adversarial perturbations.Seyed-Mohsen Moosavi-Dezfooli; Alhussein Fawzi; Omar Fawzi; Pascal Frossard 2016-10-21 Safety Verification of Deep Neural Networks.Xiaowei Huang; Marta Kwiatkowska; Sen Wang; Min Wu 2016-10-14 Are Accuracy and Robustness Correlated?.Andras Rozsa; Manuel Günther; Terrance E. Boult 2016-10-13 Assessing Threat of Adversarial Examples on Deep Neural Networks.Abigail Graese; Andras Rozsa; Terrance E. Boult 2016-10-06 Using Non-invertible Data Transformations to Build Adversarial-Robust Neural Networks.Qinglong Wang; Wenbo Guo; Alexander G. II Ororbia; Xinyu Xing; Lin Lin; C. Lee Giles; Xue Liu; Peng Liu; Gang Xiong 2016-10-04 Adversary Resistant Deep Neural Networks with an Application to Malware Detection.Qinglong Wang; Wenbo Guo; Kaixuan Zhang; Alexander G. II Ororbia; Xinyu Xing; C. Lee Giles; Xue Liu 2016-10-03 Technical Report on the CleverHans v2.1.0 Adversarial Examples Library.Nicolas Papernot; Fartash Faghri; Nicholas Carlini; Ian Goodfellow; Reuben Feinman; Alexey Kurakin; Cihang Xie; Yash Sharma; Tom Brown; Aurko Roy; Alexander Matyasko; Vahid Behzadan; Karen Hambardzumyan; Zhishuai Zhang; Yi-Lin Juang; Zhi Li; Ryan Sheatsley; Abhibhav Garg; Jonathan Uesato; Willi Gierke; Yinpeng Dong; David Berthelot; Paul Hendricks; Jonas Rauber; Rujun Long; Patrick McDaniel 2016-09-06 Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems.Battista Biggio; Giorgio Fumera; Gian Luca Marcialis; Fabio Roli 2016-09-03 Randomized Prediction Games for Adversarial Machine Learning.Samuel Rota Bulò; Battista Biggio; Ignazio Pillai; Marcello Pelillo; Fabio Roli 2016-08-31 Robustness of classifiers: from adversarial to random noise.Alhussein Fawzi; Seyed-Mohsen Moosavi-Dezfooli; Pascal Frossard 2016-08-27 A Boundary Tilting Persepective on the Phenomenon of Adversarial Examples.Thomas Tanay; Lewis Griffin 2016-08-16 Towards Evaluating the Robustness of Neural Networks.Nicholas Carlini; David Wagner 2016-08-02 A study of the effect of JPG compression on adversarial images.Gintare Karolina Dziugaite; Zoubin Ghahramani; Daniel M. Roy 2016-08-01 Early Methods for Detecting Adversarial Images.Dan Hendrycks; Kevin Gimpel 2016-07-18 On the Effectiveness of Defensive Distillation.Nicolas Papernot; Patrick McDaniel 2016-07-14 Defensive Distillation is Not Robust to Adversarial Examples.Nicholas Carlini; David Wagner 2016-07-08 Adversarial examples in the physical world.Alexey Kurakin; Ian Goodfellow; Samy Bengio 2016-06-14 Adversarial Perturbations Against Deep Neural Networks for Malware Classification.Kathrin Grosse; Nicolas Papernot; Praveen Manoharan; Michael Backes; Patrick McDaniel 2016-05-23 Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples.Nicolas Papernot; Patrick McDaniel; Ian Goodfellow Measuring Neural Net Robustness with Constraints.Osbert Bastani; Yani Ioannou; Leonidas Lampropoulos; Dimitrios Vytiniotis; Aditya Nori; Antonio Criminisi 2016-05-17 Are Facial Attributes Adversarially Robust?.Andras Rozsa; Manuel Günther; Ethan M. Rudd; Terrance E. Boult 2016-05-05 Adversarial Diversity and Hard Positive Generation.Andras Rozsa; Ethan M. Rudd; Terrance E. Boult 2016-04-27 Crafting Adversarial Input Sequences for Recurrent Neural Networks.Nicolas Papernot; Patrick McDaniel; Ananthram Swami; Richard Harang 2016-04-14 Improving the Robustness of Deep Neural Networks via Stability Training.Stephan Zheng; Yang Song; Thomas Leung; Ian Goodfellow 2016-04-09 A General Retraining Framework for Scalable Adversarial Classification.Bo Li; Yevgeniy Vorobeychik; Xinyun Chen 2016-03-16 Suppressing the Unusual: towards Robust CNNs using Symmetric Activation Functions.Qiyang Zhao; Lewis D Griffin 2016-02-08 Practical Black-Box Attacks against Machine Learning.Nicolas Papernot; Patrick McDaniel; Ian Goodfellow; Somesh Jha; Z. Berkay Celik; Ananthram Swami 2016-02-07 Ensemble Robustness and Generalization of Stochastic Deep Learning Algorithms.Tom Zahavy; Bingyi Kang; Alex Sivak; Jiashi Feng; Huan Xu; Shie Mannor 2016-01-26 Unifying Adversarial Training Algorithms with Flexible Deep Data Gradient Regularization.Alexander G. II Ororbia; C. Lee Giles; Daniel Kifer 2015-11-23 The Limitations of Deep Learning in Adversarial Settings.Nicolas Papernot; Patrick McDaniel; Somesh Jha; Matt Fredrikson; Z. Berkay Celik; Ananthram Swami 2015-11-19 A Unified Gradient Regularization Family for Adversarial Examples.Chunchuan Lyu; Kaizhu Huang; Hai-Ning Liang Manifold Regularized Deep Neural Networks using Adversarial Examples.Taehoon Lee; Minsuk Choi; Sungroh Yoon Robust Convolutional Neural Networks under Adversarial Noise.Jonghoon Jin; Aysegul Dundar; Eugenio Culurciello Foveation-based Mechanisms Alleviate Adversarial Examples.Yan Luo; Xavier Boix; Gemma Roig; Tomaso Poggio; Qi Zhao Towards Open Set Deep Networks.Abhijit Bendale; Terrance Boult 2015-11-17 Understanding Adversarial Training: Increasing Local Stability of Neural Nets through Robust Optimization.Uri Shaham; Yutaro Yamada; Sahand Negahban 2015-11-16 Adversarial Manipulation of Deep Representations.Sara Sabour; Yanshuai Cao; Fartash Faghri; David J. Fleet 2015-11-14 DeepFool: a simple and accurate method to fool deep neural networks.Seyed-Mohsen Moosavi-Dezfooli; Alhussein Fawzi; Pascal Frossard 2015-11-13 Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.Nicolas Papernot; Patrick McDaniel; Xi Wu; Somesh Jha; Ananthram Swami 2015-11-10 Learning with a Strong Adversary.Ruitong Huang; Bing Xu; Dale Schuurmans; Csaba Szepesvari 2015-10-18 Exploring the Space of Adversarial Images.Pedro Tabacof; Eduardo Valle 2015-10-14 Improving Back-Propagation by Adding an Adversarial Gradient.Arild Nøkland 2015-07-16 Deep Learning and Music Adversaries.Corey Kereliuk; Bob L. Sturm; Jan Larsen 2015-02-09 Analysis of classifiers' robustness to adversarial perturbations.Alhussein Fawzi; Omar Fawzi; Pascal Frossard 2014-12-19 Explaining and Harnessing Adversarial Examples.Ian J. Goodfellow; Jonathon Shlens; Christian Szegedy 2014-12-11 Towards Deep Neural Network Architectures Robust to Adversarial Examples.Shixiang Gu; Luca Rigazio 2014-12-05 Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images.Anh Nguyen; Jason Yosinski; Jeff Clune 2014-01-29 Security Evaluation of Support Vector Machines in Adversarial Environments.Battista Biggio; Igino Corona; Blaine Nelson; Benjamin I. P. Rubinstein; Davide Maiorca; Giorgio Fumera; Giorgio Giacinto; and Fabio Roli 2013-12-20 Intriguing properties of neural networks.Christian Szegedy; Wojciech Zaremba; Ilya Sutskever; Joan Bruna; Dumitru Erhan; Ian Goodfellow; Rob Fergus