A Complete List of All (arXiv) Adversarial Example Papers

by Nicholas Carlini 2019-06-15

It can be hard to stay up-to-date on the published papers in the field of adversarial examples, where we have seen massive growth in the number of papers written each year. I have been somewhat religiously keeping track of these papers for the last few years, and realized it may be helpful for others to release this list.

The only requirement I used for selecting papers for this list is that it is primarily a paper about adversarial examples, or extensively uses adversarial examples. Due to the sheer quantity of papers, I can't guarantee that I actually have found all of them.

But I did try.

I also may have included papers that don't match these criteria (and are about something different instead), or made inconsistent judgement calls as to whether or not any given paper is mainly an adversarial example paper. Send me an email if something is wrong and I'll correct it.

As a result, this list is completely un-filtered. Everything that mainly presents itself as an adversarial example paper is listed here; I pass no judgement of quality. For a curated list of papers that I think are excellent and worth reading, see the Adversarial Machine Learning Reading List.

One final note about the data. This list automatically updates with new papers, even before I get a chance to manually filter through them. I do this filtering roughly twice a week, and it's then that I'll remove the ones that aren't related to adversarial examples. As a result, there may be some false positives on the most recent few entries. The new un-verified entries will have a probability indicated that my simplistic (but reasonably well calibrated) bag-of-words classifier believes the given paper is actually about adversarial examples.

The full paper list appears below. I've also released a TXT file (and a TXT file with abstracts) and a JSON file with the same data. If you do anything interesting with this data I'd be happy to hear from you what it was.

Paper List

2021-04-09 Relating Adversarially Robust Generalization to Flat Minima. (99%)David Stutz; Matthias Hein; Bernt Schiele Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication. (1%)Xiquan Guan; Huamin Feng; Weiming Zhang; Hang Zhou; Jie Zhang; Nenghai Yu Learning Sampling Policy for Faster Derivative Free Optimization. (1%)Zhou Zhai; Bin Gu; Heng Huang 2021-04-08 FACESEC: A Fine-grained Robustness Evaluation Framework for Face Recognition Systems. (98%)Liang Tong; Zhengzhang Chen; Jingchao Ni; Wei Cheng; Dongjin Song; Haifeng Chen; Yevgeniy Vorobeychik Explainability-based Backdoor Attacks Against Graph Neural Networks. (15%)Jing Jason Xu; Jason Minhui; Xue; Stjepan Picek A single gradient step finds adversarial examples on random two-layers neural networks. (10%)Sébastien Bubeck; Yeshwanth Cherapanamjeri; Gauthier Gidel; Rémi Tachet des Combes Adversarial Learning Inspired Emerging Side-Channel Attacks and Defenses. (8%)Abhijitt Dhavlle 2021-04-07 Universal Adversarial Training with Class-Wise Perturbations. (99%)Philipp Benz; Chaoning Zhang; Adil Karjauv; In So Kweon Universal Spectral Adversarial Attacks for Deformable Shapes. (81%)Arianna Rampini; Franco Pestarini; Luca Cosmo; Simone Melzi; Emanuele Rodolà Adversarial Robustness Guarantees for Gaussian Processes. (68%)Andrea Patane; Arno Blaas; Luca Laurenti; Luca Cardelli; Stephen Roberts; Marta Kwiatkowska Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective. (61%)Yi Zeng; Won Park; Z. Morley Mao; Ruoxi Jia The art of defense: letting networks fool the attacker. (22%)Jinlai Zhang; Binbin Liu; Lyvjie Chen; Bo Ouyang; Jihong Zhu; Minchi Kuang; Houqing Wang; Yanmei Meng Improving Robustness of Deep Reinforcement Learning Agents: Environment Attacks based on Critic Networks. (8%)Lucas Schott; Manon Césaire; Hatem Hajri; Sylvain Lamprier Sparse Oblique Decision Trees: A Tool to Understand and Manipulate Neural Net Features. (3%)Suryabhan Singh Hada; Miguel Á. Carreira-Perpiñán; Arman Zharmagambetov An Object Detection based Solver for Google's Image reCAPTCHA v2. (1%)Md Imran Hossen; Yazhou Tu; Md Fazle Rabby; Md Nazmul Islam; Hui Cao; Xiali Hei 2021-04-06 Exploring Targeted Universal Adversarial Perturbations to End-to-end ASR Models. (93%)Zhiyun Lu; Wei Han; Yu Zhang; Liangliang Cao Adversarial Robustness under Long-Tailed Distribution. (89%)Tong Wu; Ziwei Liu; Qingqiu Huang; Yu Wang; Dahua Lin Taming Adversarial Robustness via Abstaining. (67%)Abed AlRahman Al Makdah; Vaibhav Katewa; Fabio Pasqualetti Backdoor Attack in the Physical World. (2%)Yiming Li; Tongqing Zhai; Yong Jiang; Zhifeng Li; Shu-Tao Xia 2021-04-05 Robust Classification Under $\ell_0$ Attack for the Gaussian Mixture Model. (99%)Payam Delgosha; Hamed Hassani; Ramtin Pedarsani Adaptive Clustering of Robust Semantic Representations for Adversarial Image Purification. (98%)Samuel Henrique Silva; Arun Das; Ian Scarff; Peyman Najafirad BBAEG: Towards BERT-based Biomedical Adversarial Example Generation for Text Classification. (96%)Ishani Mondal Deep Learning-Based Autonomous Driving Systems: A Survey of Attacks and Defenses. (74%)Yao Deng; Tiehua Zhang; Guannan Lou; Xi Zheng; Jiong Jin; Qing-Long Han Can audio-visual integration strengthen robustness under multimodal attacks? (68%)Yapeng Tian; Chenliang Xu Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models. (33%)Neal Mangaokar; Jiameng Pu; Parantapa Bhattacharya; Chandan K. Reddy; Bimal Viswanath Unified Detection of Digital and Physical Face Attacks. (8%)Debayan Deb; Xiaoming Liu; Anil K. Jain Beyond Categorical Label Representations for Image Classification. (2%)Boyuan Chen; Yu Li; Sunand Raghupathi; Hod Lipson Rethinking Perturbations in Encoder-Decoders for Fast Training. (1%)Sho Takase; Shun Kiyono 2021-04-04 Adversarial Attack in the Context of Self-driving. (99%)Zhenhua Chen; Chuhua Wang; David J. Crandall Reliably fast adversarial training via latent adversarial perturbation. (93%)Geon Yeong Park; Sang Wan Lee 2021-04-03 Mitigating Gradient-based Adversarial Attacks via Denoising and Compression. (99%)Rehana Mahfuz; Rajeev Sahay; Aly El Gamal Property-driven Training: All You (N)Ever Wanted to Know About. (26%)Marco Casadio; Matthew Daggitt; Ekaterina Komendantskaya; Wen Kokke; Daniel Kienitz; Rob Stewart 2021-04-02 Defending Against Image Corruptions Through Adversarial Augmentations. (92%)Dan A. Calian; Florian Stimberg; Olivia Wiles; Sylvestre-Alvise Rebuffi; Andras Gyorgy; Timothy Mann; Sven Gowal RABA: A Robust Avatar Backdoor Attack on Deep Neural Network. (83%)Ying He; Zhili Shen; Chang Xia; Jingyu Hua; Wei Tong; Sheng Zhong Fast-adapting and Privacy-preserving Federated Recommender System. (1%)Qinyong Wang; Hongzhi Yin; Tong Chen; Junliang Yu; Alexander Zhou; Xiangliang Zhang 2021-04-01 TRS: Transferability Reduced Ensemble via Encouraging Gradient Diversity and Model Smoothness. (99%)Zhuolin Yang; Linyi Li; Xiaojun Xu; Shiliang Zuo; Qian Chen; Benjamin Rubinstein; Ce Zhang; Bo Li Domain Invariant Adversarial Learning. (98%)Matan Levi; Idan Attias; Aryeh Kontorovich Normal vs. Adversarial: Salience-based Analysis of Adversarial Samples for Relation Extraction. (92%)Luoqiu Li; Xiang Chen; Ningyu Zhang; Shumin Deng; Xin Xie; Chuanqi Tan; Mosha Chen; Fei Huang; Huajun Chen Towards Evaluating and Training Verifiably Robust Neural Networks. (45%)Zhaoyang Lyu; Minghao Guo; Tong Wu; Guodong Xu; Kehuan Zhang; Dahua Lin Augmenting Zero Trust Architecture to Endpoints Using Blockchain: A Systematic Review. (3%)Lampis Alevizos; Vinh Thong Ta; Max Hashem Eiza Learning from Noisy Labels via Dynamic Loss Thresholding. (1%)Hao Yang; Youzhi Jin; Ziyin Li; Deng-Bao Wang; Lei Miao; Xin Geng; Min-Ling Zhang 2021-03-31 Adversarial Heart Attack: Neural Networks Fooled to Segment Heart Symbols in Chest X-Ray Images. (99%)Gerda Bortsova; Florian Dubost; Laurens Hogeweg; Ioannis Katramados; Bruijne Marleen de Adversarial Attacks and Defenses for Speech Recognition Systems. (99%)Piotr Żelasko; Sonal Joshi; Yiwen Shao; Jesus Villalba; Jan Trmal; Najim Dehak; Sanjeev Khudanpur Fast Certified Robust Training via Better Initialization and Shorter Warmup. (86%)Zhouxing Shi; Yihan Wang; Huan Zhang; Jinfeng Yi; Cho-Jui Hsieh Fast Jacobian-Vector Product for Deep Networks. (22%)Randall Balestriero; Richard Baraniuk Too Expensive to Attack: A Joint Defense Framework to Mitigate Distributed Attacks for the Internet of Things Grid. (2%)Jianhua Li; Ximeng Liu; Jiong Jin; Shui Yu Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations. (1%)Jean-Paul A. Yaacoub; Hassan N. Noura; Ola Salman; Ali Chehab 2021-03-30 On the Robustness of Vision Transformers to Adversarial Examples. (99%)Kaleel Mahmood; Rigel Mahmood; Dijk Marten van Class-Aware Robust Adversarial Training for Object Detection. (96%)Pin-Chun Chen; Bo-Han Kung; Jun-Cheng Chen PointBA: Towards Backdoor Attacks in 3D Point Cloud. (92%)Xinke Li; Zhiru Chen; Yue Zhao; Zekun Tong; Yabang Zhao; Andrew Lim; Joey Tianyi Zhou Statistical inference for individual fairness. (67%)Subha Maity; Songkai Xue; Mikhail Yurochkin; Yuekai Sun Learning Robust Feedback Policies from Demonstrations. (47%)Abed AlRahman Al Makdah; Vishaal Krishnan; Fabio Pasqualetti What Causes Optical Flow Networks to be Vulnerable to Physical Adversarial Attacks. (33%)Simon Schrodi; Tonmoy Saikia; Thomas Brox Improving robustness against common corruptions with frequency biased models. (1%)Tonmoy Saikia; Cordelia Schmid; Thomas Brox 2021-03-29 On the Adversarial Robustness of Visual Transformers. (99%)Rulin Shao; Zhouxing Shi; Jinfeng Yi; Pin-Yu Chen; Cho-Jui Hsieh Lagrangian Objective Function Leads to Improved Unforeseen Attack Generalization in Adversarial Training. (99%)Mohammad Azizmalayeri; Mohammad Hossein Rohban Enhancing the Transferability of Adversarial Attacks through Variance Tuning. (99%)Xiaosen Wang; Kun He ZeroGrad : Mitigating and Explaining Catastrophic Overfitting in FGSM Adversarial Training. (95%)Zeinab Golgooni; Mehrdad Saberi; Masih Eskandar; Mohammad Hossein Rohban Certifiably-Robust Federated Adversarial Learning via Randomized Smoothing. (93%)Cheng Chen; Bhavya Kailkhura; Ryan Goldhahn; Yi Zhou Fooling LiDAR Perception via Adversarial Trajectory Perturbation. (83%)Yiming Li; Congcong Wen; Felix Juefei-Xu; Chen Feng Robust Reinforcement Learning under model misspecification. (31%)Lebin Yu; Jian Wang; Xudong Zhang Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models. (16%)Josh Kalin; David Noever; Matthew Ciolino; Dominick Hambrick; Gerry Dozier Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models. (9%)Wenkai Yang; Lei Li; Zhiyuan Zhang; Xuancheng Ren; Xu Sun; Bin He 2021-03-28 Improved Autoregressive Modeling with Distribution Smoothing. (86%)Chenlin Meng; Jiaming Song; Yang Song; Shengjia Zhao; Stefano Ermon 2021-03-27 On the benefits of robust models in modulation recognition. (99%)Javier Maroto; Gérôme Bovet; Pascal Frossard LiBRe: A Practical Bayesian Approach to Adversarial Detection. (99%)Zhijie Deng; Xiao Yang; Shizhen Xu; Hang Su; Jun Zhu IoU Attack: Towards Temporally Coherent Black-Box Adversarial Attack for Visual Object Tracking. (99%)Shuai Jia; Yibing Song; Chao Ma; Xiaokang Yang 2021-03-26 Cyclic Defense GAN Against Speech Adversarial Attacks. (99%)Mohammad Esmaeilpour; Patrick Cardinal; Alessandro Lameiras Koerich Combating Adversaries with Anti-Adversaries. (93%)Motasem Alfarra; Juan C. Pérez; Ali Thabet; Adel Bibi; Philip H. S. Torr; Bernard Ghanem On Generating Transferable Targeted Perturbations. (93%)Muzammal Naseer; Salman Khan; Munawar Hayat; Fahad Shahbaz Khan; Fatih Porikli Building Reliable Explanations of Unreliable Neural Networks: Locally Smoothing Perspective of Model Interpretation. (86%)Dohun Lim; Hyeonseok Lee; Sungchan Kim Ensemble-in-One: Learning Ensemble within Random Gated Networks for Enhanced Adversarial Robustness. (83%)Yi Cai; Xuefei Ning; Huazhong Yang; Yu Wang Visual Explanations from Spiking Neural Networks using Interspike Intervals. (62%)Youngeun Kim; Priyadarshini Panda Unsupervised Robust Domain Adaptation without Source Data. (13%)Peshal Agarwal; Danda Pani Paudel; Jan-Nico Zaech; Gool Luc Van 2021-03-25 Adversarial Attacks are Reversible with Natural Supervision. (99%)Chengzhi Mao; Mia Chiquier; Hao Wang; Junfeng Yang; Carl Vondrick Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond. (98%)Brian Kim; Yalin E. Sagduyu; Tugba Erpek; Sennur Ulukus MagDR: Mask-guided Detection and Reconstruction for Defending Deepfakes. (81%)Zhikai Chen; Lingxi Xie; Shanmin Pang; Yong He; Bo Zhang Deep-RBF Networks for Anomaly Detection in Automotive Cyber-Physical Systems. (70%)Matthew Burruss; Shreyas Ramakrishna; Abhishek Dubey Orthogonal Projection Loss. (45%)Kanchana Ranasinghe; Muzammal Naseer; Munawar Hayat; Salman Khan; Fahad Shahbaz Khan THAT: Two Head Adversarial Training for Improving Robustness at Scale. (26%)Zuxuan Wu; Tom Goldstein; Larry S. Davis; Ser-Nam Lim A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and Defenses in Cryptography. (11%)Xiaoxuan Lou; Tianwei Zhang; Jun Jiang; Yinqian Zhang HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks. (10%)Peizhuo Lv; Pan Li; Shengzhi Zhang; Kai Chen; Ruigang Liang; Yue Zhao; Yingjiu Li The Geometry of Over-parameterized Regression and Adversarial Perturbations. (2%)Jason W. Rocks; Pankaj Mehta Synthesize-It-Classifier: Learning a Generative Classifier through RecurrentSelf-analysis. (1%)Arghya Pal; Rapha Phan; KokSheik Wong Spirit Distillation: Precise Real-time Prediction with Insufficient Data. (1%)Zhiyuan Wu; Hong Qi; Yu Jiang; Chupeng Cui; Zongmin Yang; Xinhui Xue Recent Advances in Large Margin Learning. (1%)Yiwen Guo; Changshui Zhang 2021-03-24 Adversarial Feature Stacking for Accurate and Robust Predictions. (99%)Faqiang Liu; Rong Zhao; Luping Shi Vulnerability of Appearance-based Gaze Estimation. (97%)Mingjie Xu; Haofei Wang; Yunfei Liu; Feng Lu Black-box Detection of Backdoor Attacks with Limited Information and Data. (96%)Yinpeng Dong; Xiao Yang; Zhijie Deng; Tianyu Pang; Zihao Xiao; Hang Su; Jun Zhu Deepfake Forensics via An Adversarial Game. (10%)Zhi Wang; Yiwen Guo; Wangmeng Zuo 2021-03-23 Robust and Accurate Object Detection via Adversarial Learning. (98%)Xiangning Chen; Cihang Xie; Mingxing Tan; Li Zhang; Cho-Jui Hsieh; Boqing Gong CLIP: Cheap Lipschitz Training of Neural Networks. (96%)Leon Bungert; René Raab; Tim Roith; Leo Schwinn; Daniel Tenbrinck The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers? (92%)Antonio Emanuele Cinà; Sebastiano Vascon; Ambra Demontis; Battista Biggio; Fabio Roli; Marcello Pelillo Leveraging background augmentations to encourage semantic focus in self-supervised contrastive learning. (83%)Chaitanya K. Ryali; David J. Schwab; Ari S. Morcos RPATTACK: Refined Patch Attack on General Object Detectors. (76%)Hao Huang; Yongtao Wang; Zhaoyu Chen; Zhi Tang; Wenqiang Zhang; Kai-Kuang Ma NNrepair: Constraint-based Repair of Neural Network Classifiers. (50%)Muhammad Usman; Divya Gopinath; Youcheng Sun; Yannic Noller; Corina Pasareanu Are all outliers alike? On Understanding the Diversity of Outliers for Detecting OODs. (31%)Ramneet Kaur; Susmit Jha; Anirban Roy; Oleg Sokolsky; Insup Lee Improved Estimation of Concentration Under $\ell_p$-Norm Distance Metrics Using Half Spaces. (22%)Jack Prescott; Xiao Zhang; David Evans ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning. (1%)Oliver Lutz; Huili Chen; Hossein Fereidooni; Christoph Sendner; Alexandra Dmitrienko; Ahmad Reza Sadeghi; Farinaz Koushanfar 2021-03-22 Grey-box Adversarial Attack And Defence For Sentiment Classification. (99%)Ying Xu; Xu Zhong; Antonio Jimeno Yepes; Jey Han Lau Fast Approximate Spectral Normalization for Robust Deep Neural Networks. (98%)Zhixin Pan; Prabhat Mishra Spatio-Temporal Sparsification for General Robust Graph Convolution Networks. (87%)Mingming Lu; Ya Zhang RA-BNN: Constructing Robust & Accurate Binary Neural Network to Simultaneously Defend Adversarial Bit-Flip Attack and Improve Accuracy. (75%)Adnan Siraj Rakin; Li Yang; Jingtao Li; Fan Yao; Chaitali Chakrabarti; Yu Cao; Jae-sun Seo; Deliang Fan Adversarial Feature Augmentation and Normalization for Visual Recognition. (13%)Tianlong Chen; Yu Cheng; Zhe Gan; Jianfeng Wang; Lijuan Wang; Zhangyang Wang; Jingjing Liu Adversarially Optimized Mixup for Robust Classification. (13%)Jason Bunk; Srinjoy Chattopadhyay; B. S. Manjunath; Shivkumar Chandrasekaran 2021-03-21 ExAD: An Ensemble Approach for Explanation-based Adversarial Detection. (99%)Raj Vardhan; Ninghao Liu; Phakpoom Chinprutthiwong; Weijie Fu; Zhenyu Hu; Xia Ben Hu; Guofei Gu TextFlint: Unified Multilingual Robustness Evaluation Toolkit for Natural Language Processing. (75%)Tao Gui; Xiao Wang; Qi Zhang; Qin Liu; Yicheng Zou; Xin Zhou; Rui Zheng; Chong Zhang; Qinzhuo Wu; Jiacheng Ye; Zexiong Pang; Yongxin Zhang; Zhengyan Li; Ruotian Ma; Zichu Fei; Ruijian Cai; Jun Zhao; Xinwu Hu; Zhiheng Yan; Yiding Tan; Yuan Hu; Qiyuan Bian; Zhihua Liu; Bolin Zhu; Shan Qin; Xiaoyu Xing; Jinlan Fu; Yue Zhang; Minlong Peng; Xiaoqing Zheng; Yaqian Zhou; Zhongyu Wei; Xipeng Qiu; Xuanjing Huang Natural Perturbed Training for General Robustness of Neural Network Classifiers. (38%)Sadaf Gulshad; Arnold Smeulders Self adversarial attack as an augmentation method for immunohistochemical stainings. (33%)Jelica Vasiljević; Friedrich Feuerhake; Cédric Wemmert; Thomas Lampert 2021-03-20 Boundary Attributions Provide Normal (Vector) Attributions. (15%)Zifan Wang; Matt Fredrikson; Anupam Datta 2021-03-19 LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial Attack. (99%)Ashkan Esmaeili; Marzieh Edraki; Nazanin Rahnavard; Mubarak Shah; Ajmal Mian SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems. (93%)Yuxuan Chen; Jiangshan Zhang; Xuejing Yuan; Shengzhi Zhang; Kai Chen; Xiaofeng Wang; Shanqing Guo Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions. (86%)Michael Goebel; Jason Bunk; Srinjoy Chattopadhyay; Lakshmanan Nataraj; Shivkumar Chandrasekaran; B. S. Manjunath Interpretable Deep Learning: Interpretations, Interpretability, Trustworthiness, and Beyond. (1%)Xuhong Li; Haoyi Xiong; Xingjian Li; Xuanyu Wu; Xiao Zhang; Ji Liu; Jiang Bian; Dejing Dou 2021-03-18 Generating Adversarial Computer Programs using Optimized Obfuscations. (99%)Shashank Srikant; Sijia Liu; Tamara Mitrovska; Shiyu Chang; Quanfu Fan; Gaoyuan Zhang; Una-May O'Reilly Boosting Adversarial Transferability through Enhanced Momentum. (99%)Xiaosen Wang; Jiadong Lin; Han Hu; Jingdong Wang; Kun He Explainable Adversarial Attacks in Deep Neural Networks Using Activation Profiles. (98%)Gabriel D. Cantareira; Rodrigo F. Mello; Fernando V. Paulovich Enhancing Transformer for Video Understanding Using Gated Multi-Level Attention and Temporal Adversarial Training. (76%)Saurabh Sahu; Palash Goyal Model Extraction and Adversarial Transferability, Your BERT is Vulnerable! (69%)Xuanli He; Lingjuan Lyu; Qiongkai Xu; Lichao Sun TOP: Backdoor Detection in Neural Networks via Transferability of Perturbation. (61%)Todd Huster; Emmanuel Ekwedike Noise Modulation: Let Your Model Interpret Itself. (54%)Haoyang Li; Xinggang Wang Reading Isn't Believing: Adversarial Attacks On Multi-Modal Neurons. (9%)David A. Noever; Samantha E. Miller Noever 2021-03-17 Can Targeted Adversarial Examples Transfer When the Source and Target Models Have No Label Space Overlap? (99%)Nathan Inkawhich; Kevin J Liang; Jingyang Zhang; Huanrui Yang; Hai Li; Yiran Chen Adversarial Attacks on Camera-LiDAR Models for 3D Car Detection. (98%)Mazen Abdelfattah; Kaiwen Yuan; Z. Jane Wang; Rabab Ward Improved, Deterministic Smoothing for L1 Certified Robustness. (80%)Alexander Levine; Soheil Feizi Code-Mixing on Sesame Street: Dawn of the Adversarial Polyglots. (38%)Samson Tan; Shafiq Joty Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss. (13%)Boxiang Wendy Dong; Wendy Hui; Wang; Aparna S. Varde; Dawei Li; Bharath K. Samanthula; Weifeng Sun; Liang Zhao Understanding Generalization in Adversarial Training via the Bias-Variance Decomposition. (2%)Yaodong Yu; Zitong Yang; Edgar Dobriban; Jacob Steinhardt; Yi Ma 2021-03-16 Adversarial YOLO: Defense Human Detection Patch Attacks via Detecting Adversarial Patches. (92%)Nan Ji; YanFei Feng; Haidong Xie; Xueshuang Xiang; Naijin Liu Anti-Adversarially Manipulated Attributions for Weakly and Semi-Supervised Semantic Segmentation. (75%)Jungbeom Lee; Eunji Kim; Sungroh Yoon Bio-inspired Robustness: A Review. (70%)Harshitha Machiraju; Oh-Hyeon Choung; Pascal Frossard; Michael. H Herzog Adversarial Driving: Attacking End-to-End Autonomous Driving Systems. (68%)Han Wu; Wenjie Ruan 2021-03-15 Constant Random Perturbations Provide Adversarial Robustness with Minimal Effect on Accuracy. (83%)Bronya Roni Chernyak; Bhiksha Raj; Tamir Hazan; Joseph Keshet Adversarial Training is Not Ready for Robot Learning. (67%)Mathias Lechner; Ramin Hasani; Radu Grosu; Daniela Rus; Thomas A. Henzinger HDTest: Differential Fuzz Testing of Brain-Inspired Hyperdimensional Computing. (64%)Dongning Ma; Jianmin Guo; Yu Jiang; Xun Jiao Understanding invariance via feedforward inversion of discriminatively trained classifiers. (10%)Piotr Teterwak; Chiyuan Zhang; Dilip Krishnan; Michael C. Mozer Meta-Solver for Neural Ordinary Differential Equations. (2%)Julia Gusak; Alexandr Katrutsa; Talgat Daulbaev; Andrzej Cichocki; Ivan Oseledets 2021-03-14 Towards Robust Speech-to-Text Adversarial Attack. (99%)Mohammad Esmaeilpour; Patrick Cardinal; Alessandro Lameiras Koerich BreakingBED -- Breaking Binary and Efficient Deep Neural Networks by Adversarial Attacks. (98%)Manoj Rohit Vemparala; Alexander Frickenstein; Nael Fasfous; Lukas Frickenstein; Qi Zhao; Sabine Kuhn; Daniel Ehrhardt; Yuankai Wu; Christian Unger; Naveen Shankar Nagaraja; Walter Stechele Multi-Discriminator Sobolev Defense-GAN Against Adversarial Attacks for End-to-End Speech Systems. (82%)Mohammad Esmaeilpour; Patrick Cardinal; Alessandro Lameiras Koerich 2021-03-13 Attack as Defense: Characterizing Adversarial Examples using Robustness. (99%)Zhe Zhao; Guangke Chen; Jingyi Wang; Yiwei Yang; Fu Song; Jun Sun Generating Unrestricted Adversarial Examples via Three Parameters. (99%)Hanieh Naderi; Leili Goli; Shohreh Kasaei Simeon -- Secure Federated Machine Learning Through Iterative Filtering. (12%)Nicholas Malecki; Hye-young Paik; Aleksandar Ignjatovic; Alan Blair; Elisa Bertino 2021-03-12 Learning Defense Transformers for Counterattacking Adversarial Examples. (99%)Jincheng Li; Jiezhang Cao; Yifan Zhang; Jian Chen; Mingkui Tan Internal Wasserstein Distance for Adversarial Attack and Defense. (99%)Jincheng Li; Jiezhang Cao; Shuhai Zhang; Yanwu Xu; Jian Chen; Mingkui Tan Game-theoretic Understanding of Adversarially Learned Features. (98%)Jie Ren; Die Zhang; Yisen Wang; Lu Chen; Zhanpeng Zhou; Xu Cheng; Xin Wang; Yiting Chen; Jie Shi; Quanshi Zhang Adversarial Machine Learning Security Problems for 6G: mmWave Beam Prediction Use-Case. (82%)Evren Catak; Ferhat Ozgur Catak; Arild Moldsvor Network Environment Design for Autonomous Cyberdefense. (1%)Andres Molina-Markham; Cory Miniter; Becky Powell; Ahmad Ridley 2021-03-11 Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling. (99%)Md Shohidul Islam; Ihsen Alouani; Khaled N. Khasawneh Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Complete and Incomplete Neural Network Verification. (99%)Shiqi Wang; Huan Zhang; Kaidi Xu; Xue Lin; Suman Jana; Cho-Jui Hsieh; J. Zico Kolter Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink. (99%)Ranjie Duan; Xiaofeng Mao; A. K. Qin; Yun Yang; Yuefeng Chen; Shaokai Ye; Yuan He DAFAR: Detecting Adversaries by Feedback-Autoencoder Reconstruction. (99%)Haowen Liu; Ping Yi; Hsiao-Ying Lin; Jie Shi ReinforceBug: A Framework to Generate Adversarial Textual Examples. (97%)Bushra Sabir; M. Ali Babar; Raj Gaire Multi-Task Federated Reinforcement Learning with Adversaries. (15%)Aqeel Anwar; Arijit Raychowdhury BODAME: Bilevel Optimization for Defense Against Model Extraction. (8%)Yuto Mori; Atsushi Nitanda; Akiko Takeda 2021-03-10 Improving Adversarial Robustness via Channel-wise Activation Suppressing. (99%)Yang Bai; Yuyuan Zeng; Yong Jiang; Shu-Tao Xia; Xingjun Ma; Yisen Wang TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack. (92%)Yam Sharon; David Berend; Yang Liu; Asaf Shabtai; Yuval Elovici VideoMoCo: Contrastive Video Representation Learning with Temporally Adversarial Examples. (67%)Tian Pan; Yibing Song; Tianyu Yang; Wenhao Jiang; Wei Liu Fine-tuning of Pre-trained End-to-end Speech Recognition with Generative Adversarial Networks. (1%)Md Akmal Haidar; Mehdi Rezagholizadeh 2021-03-09 Stabilized Medical Image Attacks. (99%)Gege Qi; Lijun Gong; Yibing Song; Kai Ma; Yefeng Zheng Selective and Features based Adversarial Example Detection. (99%)Ahmed Aldahdooh; Wassim Hamidouche; Olivier Déforges Practical Relative Order Attack in Deep Ranking. (99%)Mo Zhou; Le Wang; Zhenxing Niu; Qilin Zhang; Yinghui Xu; Nanning Zheng; Gang Hua BASAR:Black-box Attack on Skeletal Action Recognition. (99%)Yunfeng Diao; Tianjia Shao; Yong-Liang Yang; Kun Zhou; He Wang Understanding the Robustness of Skeleton-based Action Recognition under Adversarial Attack. (98%)He Wang; Feixiang He; Zhexi Peng; Tianjia Shao; Yong-Liang Yang; Kun Zhou; David Hogg Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency. (10%)Mohammad Mehdi Yadollahi; Farzaneh Shoeleh; Sajjad Dadkhah; Ali A. Ghorbani Deep Learning for Android Malware Defenses: a Systematic Literature Review. (4%)Yue Liu; Chakkrit Tantithamthavorn; Li Li; Yepang Liu Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup. (2%)Zhimin Luo; Mengce Zheng; Ping Wang; Minhui Jin; Jiajia Zhang; Honggang Hu; Nenghai Yu 2021-03-08 Packet-Level Adversarial Network Traffic Crafting using Sequence Generative Adversarial Networks. (99%)Qiumei Cheng; Shiying Zhou; Yi Shen; Dezhang Kong; Chunming Wu Enhancing Transformation-based Defenses against Adversarial Examples with First-Order Perturbations. (99%)Haimin Zhang; Min Xu Contemplating real-world object classification. (81%)Ali Borji Consistency Regularization for Adversarial Robustness. (47%)Jihoon Tack; Sihyun Yu; Jongheon Jeong; Minseon Kim; Sung Ju Hwang; Jinwoo Shin Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses. (2%)Anatoly Shusterman; Ayush Agarwal; Sioli O'Connell; Daniel Genkin; Yossi Oren; Yuval Yarom Deep Model Intellectual Property Protection via Deep Watermarking. (1%)Jie Zhang; Dongdong Chen; Jing Liao; Weiming Zhang; Huamin Feng; Gang Hua; Nenghai Yu 2021-03-07 Universal Adversarial Perturbations and Image Spam Classifiers. (99%)Andy Phung; Mark Stamp Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain. (99%)Jinyu Tian; Jiantao Zhou; Yuanman Li; Jia Duan Improving Global Adversarial Robustness Generalization With Adversarially Trained GAN. (99%)Desheng School of Electrical Engineering, Southwest Jiaotong University, Chengdu, P. R. China Wang; Weidong School of Electrical Engineering, Southwest Jiaotong University, Chengdu, P. R. China Jin; Yunpu School of Electrical Engineering, Southwest Jiaotong University, Chengdu, P. R. China Wu; Aamir School of Electrical Engineering, Southwest Jiaotong University, Chengdu, P. R. China Khan Insta-RS: Instance-wise Randomized Smoothing for Improved Robustness and Accuracy. (76%)Chen Chen; Kezhi Kong; Peihong Yu; Juan Luque; Tom Goldstein; Furong Huang 2021-03-06 T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification. (98%)Ahmadreza Azizi; Ibrahim Asadullah Tahmid; Asim Waheed; Neal Mangaokar; Jiameng Pu; Mobin Javed; Chandan K. Reddy; Bimal Viswanath Hidden Backdoor Attack against Semantic Segmentation Models. (93%)Yiming Li; Yanjie Li; Yalei Lv; Yong Jiang; Shu-Tao Xia 2021-03-05 Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence. (13%)Vasileios Mavroeidis; Siri Bromander Don't Forget to Sign the Gradients! (10%)Omid Aramoon; Pin-Yu Chen; Gang Qu PCP: Preemptive Circuit Padding against Tor circuit fingerprinting. (1%)George Kadianakis; Theodoros Polyzos; Mike Perry; Kostas Chatzikokolakis 2021-03-04 Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples. (99%)Washington Garcia; Pin-Yu Chen; Somesh Jha; Scott Clouse; Kevin R. B. Butler WaveGuard: Understanding and Mitigating Audio Adversarial Examples. (99%)Shehzeen Hussain; Paarth Neekhara; Shlomo Dubnov; Julian McAuley; Farinaz Koushanfar Towards Evaluating the Robustness of Deep Diagnostic Models by Adversarial Attack. (99%)Mengting Xu; Tao Zhang; Zhongnian Li; Mingxia Liu; Daoqiang Zhang QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval. (99%)Xiaodan Li; Jinfeng Li; Yuefeng Chen; Shaokai Ye; Yuan He; Shuhui Wang; Hang Su; Hui Xue SpectralDefense: Detecting Adversarial Attacks on CNNs in the Fourier Domain. (99%)Paula Harder; Franz-Josef Pfreundt; Margret Keuper; Janis Keuper Gradient-Guided Dynamic Efficient Adversarial Training. (96%)Fu Wang; Yanghao Zhang; Yanbin Zheng; Wenjie Ruan PointGuard: Provably Robust 3D Point Cloud Classification. (92%)Hongbin Liu; Jinyuan Jia; Neil Zhenqiang Gong Defending Medical Image Diagnostics against Privacy Attacks using Generative Methods. (12%)William Paul; Yinzhi Cao; Miaomiao Zhang; Phil Burlina A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems. (1%)Nur Imtiazul Haque; Mohammad Ashiqur Rahman; Md Hasan Shahriar; Alvi Ataur Khalil; Selcuk Uluagac 2021-03-03 Structure-Preserving Progressive Low-rank Image Completion for Defending Adversarial Attacks. (99%)Zhiqun Zhao; Hengyou Wang; Hao Sun; Zhihai He Shift Invariance Can Reduce Adversarial Robustness. (87%)Songwei Ge; Vasu Singla; Ronen Basri; David Jacobs A Robust Adversarial Network-Based End-to-End Communications System With Strong Generalization Ability Against Adversarial Attacks. (81%)Yudi Dong; Huaxia Wang; Yu-Dong Yao A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models. (81%)Josh Kalin; David Noever; Matthew Ciolino On the effectiveness of adversarial training against common corruptions. (67%)Klim Kireev; Maksym Andriushchenko; Nicolas Flammarion Formalizing Generalization and Robustness of Neural Networks to Weight Perturbations. (64%)Yu-Lin Tsai; Chia-Yi Hsu; Chia-Mu Yu; Pin-Yu Chen 2021-03-02 A Survey On Universal Adversarial Attack. (99%)Chaoning Zhang; Philipp Benz; Chenguo Lin; Adil Karjauv; Jing Wu; In So Kweon Evaluating the Robustness of Geometry-Aware Instance-Reweighted Adversarial Training. (99%)Dorjan Hitaj; Giulio Pagnotta; Iacopo Masi; Luigi V. Mancini Adversarial Examples for Unsupervised Machine Learning Models. (98%)Chia-Yi Hsu; Pin-Yu Chen; Songtao Lu; Sijia Lu; Chia-Mu Yu Online Adversarial Attacks. (98%)Andjela Mladenovic; Avishek Joey Bose; Hugo Berard; William L. Hamilton; Simon Lacoste-Julien; Pascal Vincent; Gauthier Gidel ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples. (97%)Mingfu Xue; Shichang Sun; Can He; Yushu Zhang; Jian Wang; Weiqiang Liu DeepCert: Verification of Contextually Relevant Robustness for Neural Network Image Classifiers. (97%)Colin Paterson; Haoze Wu; John Grese; Radu Calinescu; Corina S. Pasareanu; Clark Barrett Fixing Data Augmentation to Improve Adversarial Robustness. (69%)Sylvestre-Alvise Rebuffi; Sven Gowal; Dan A. Calian; Florian Stimberg; Olivia Wiles; Timothy Mann A Brief Survey on Deep Learning Based Data Hiding, Steganography and Watermarking. (26%)Chaoning Zhang; Chenguo Lin; Philipp Benz; Kejiang Chen; Weiming Zhang; In So Kweon Group-wise Inhibition based Feature Regularization for Robust Classification. (13%)Haozhe Liu; Haoqian Wu; Weicheng Xie; Feng Liu; Linlin Shen DP-InstaHide: Provably Defusing Poisoning and Backdoor Attacks with Differentially Private Data Augmentations. (1%)Eitan Borgnia; Jonas Geiping; Valeriia Cherepanova; Liam Fowl; Arjun Gupta; Amin Ghiasi; Furong Huang; Micah Goldblum; Tom Goldstein 2021-03-01 Dual Attention Suppression Attack: Generate Adversarial Camouflage in Physical World. (99%)Jiakai Wang; Aishan Liu; Zixin Yin; Shunchang Liu; Shiyu Tang; Xianglong Liu Brain Programming is Immune to Adversarial Attacks: Towards Accurate and Robust Image Classification using Symbolic Learning. (99%)Gerardo Ibarra-Vazquez; Gustavo Olague; Mariana Chan-Ley; Cesar Puente; Carlos Soubervielle-Montalvo Smoothness Analysis of Loss Functions of Adversarial Training. (98%)Sekitoshi Kanai; Masanori Yamada; Hiroshi Takahashi; Yuki Yamanaka; Yasutoshi Ida Explaining Adversarial Vulnerability with a Data Sparsity Hypothesis. (96%)Mahsa Paknezhad; Cuong Phuc Ngo; Amadeus Aristo Winarto; Alistair Cheong; Beh Chuen Yang; Wu Jiayang; Lee Hwee Kuan Mind the box: $l_1$-APGD for sparse adversarial attacks on image classifiers. (93%)Francesco Croce; Matthias Hein Adversarial training in communication constrained federated learning. (87%)Devansh Shah; Parijat Dube; Supriyo Chakraborty; Ashish Verma Counterfactual Explanations for Oblique Decision Trees: Exact, Efficient Algorithms. (82%)Miguel Á. Carreira-Perpiñán; Suryabhan Singh Hada Am I a Real or Fake Celebrity? Measuring Commercial Face Recognition Web APIs under Deepfake Impersonation Attack. (70%)Shahroz Tariq; Sowon Jeon; Simon S. Woo A Multiclass Boosting Framework for Achieving Fast and Provable Adversarial Robustness. (64%)Jacob Abernethy; Pranjal Awasthi; Satyen Kale 2021-02-28 Model-Agnostic Defense for Lane Detection against Adversarial Attack. (98%)Henry Xu; An Ju; David Wagner Robust learning under clean-label attack. (22%)Avrim Blum; Steve Hanneke; Jian Qian; Han Shao 2021-02-27 Effective Universal Unrestricted Adversarial Attacks using a MOE Approach. (98%)A. E. Baia; Bari G. Di; V. Poggioni Tiny Adversarial Mulit-Objective Oneshot Neural Architecture Search. (93%)Guoyang Xie; Jinbao Wang; Guo Yu; Feng Zheng; Yaochu Jin End-to-end Uncertainty-based Mitigation of Adversarial Attacks to Automated Lane Centering. (73%)Ruochen Jiao; Hengyi Liang; Takami Sato; Junjie Shen; Qi Alfred Chen; Qi Zhu Adversarial Information Bottleneck. (33%)Pemhlong Zhai; Shihua Zhang Neuron Coverage-Guided Domain Generalization. (2%)Chris Xing Tian; Haoliang Li; Xiaofei Xie; Yang Liu; Shiqi Wang 2021-02-26 What Doesn't Kill You Makes You Robust(er): Adversarial Training against Poisons and Backdoors.Jonas Geiping; Liam Fowl; Gowthami Somepalli; Micah Goldblum; Michael Moeller; Tom Goldstein NEUROSPF: A tool for the Symbolic Analysis of Neural Networks. (68%)Muhammad Usman; Yannic Noller; Corina Pasareanu; Youcheng Sun; Divya Gopinath 2021-02-25 On Instabilities of Conventional Multi-Coil MRI Reconstruction to Small Adverserial Perturbations.Chi Zhang; Jinghan Jia; Burhaneddin Yaman; Steen Moeller; Sijia Liu; Mingyi Hong; Mehmet Akçakaya Do Input Gradients Highlight Discriminative Features?Harshay Shah; Prateek Jain; Praneeth Netrapalli Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints.Maura Pintor; Fabio Roli; Wieland Brendel; Battista Biggio Cybersecurity Threats in Connected and Automated Vehicles based Federated Learning Systems.Ranwa Al Mallah; Godwin Badu-Marfo; Bilal Farooq Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks.Huichen Li; Linyi Li; Xiaojun Xu; Xiaolu Zhang; Shuang Yang; Bo Li Understanding Robustness in Teacher-Student Setting: A New Perspective.Zhuolin Yang; Zhaoxi Chen; Tiffany Cai; Xinyun Chen; Bo Li; Yuandong Tian 2021-02-24 Confidence Calibration with Bounded Error Using Transformations.Sooyong Jang; Radoslav Ivanov; Insup lee; James Weimer Sketching Curvature for Efficient Out-of-Distribution Detection for Deep Neural Networks.Apoorva Sharma; Navid Azizan; Marco Pavone Robust SleepNets.Yigit Alparslan; Edward Kim Multiplicative Reweighting for Robust Neural Network Optimization.Noga Bar; Tomer Koren; Raja Giryes Identifying Untrustworthy Predictions in Neural Networks by Geometric Gradient Analysis.Leo Schwinn; An Nguyen; René Raab; Leon Bungert; Daniel Tenbrinck; Dario Zanca; Martin Burger; Bjoern Eskofier Graphfool: Targeted Label Adversarial Attack on Graph Embedding.Jinyin Chen; Xiang Lin; Dunjie Zhang; Wenrong Jiang; Guohan Huang; Hui Xiong; Yun Xiang 2021-02-23 The Sensitivity of Word Embeddings-based Author Detection Models to Semantic-preserving Adversarial Perturbations.Jeremiah Duncan; Fabian Fallas; Chris Gropp; Emily Herron; Maria Mahbub; Paula Olaya; Eduardo Ponce; Tabitha K. Samuel; Daniel Schultz; Sudarshan Srinivasan; Maofeng Tang; Viktor Zenkov; Quan Zhou; Edmon Begoli Oriole: Thwarting Privacy against Trustworthy Deep Learning Models.Liuqiao Chen; Hu Wang; Benjamin Zi Hao Zhao; Minhui Xue; Haifeng Qian Rethinking Natural Adversarial Examples for Classification Models.Xiao Li; Jianmin Li; Ting Dai; Jie Shi; Jun Zhu; Xiaolin Hu Automated Discovery of Adaptive Attacks on Adversarial Defenses.Chengyuan Yao; Pavol Bielik; Petar Tsankov; Martin Vechev Adversarial Robustness with Non-uniform Perturbations.Ecenaz Erdemir; Jeffrey Bickford; Luca Melis; Sergul Aydore Non-Singular Adversarial Robustness of Neural Networks.Yu-Lin Tsai; Chia-Yi Hsu; Chia-Mu Yu; Pin-Yu Chen Enhancing Model Robustness By Incorporating Adversarial Knowledge Into Semantic Representation.Jinfeng Li; Tianyu Du; Xiangyu Liu; Rong Zhang; Hui Xue; Shouling Ji Adversarial Examples Detection beyond Image Space.Kejiang Chen; Yuefeng Chen; Hang Zhou; Chuan Qin; Xiaofeng Mao; Weiming Zhang; Nenghai Yu 2021-02-22 Resilience of Bayesian Layer-Wise Explanations under Adversarial Attacks.Ginevra Carbone; Guido Sanguinetti; Luca Bortolussi On the robustness of randomized classifiers to adversarial examples.Rafael Pinot; Laurent Meunier; Florian Yger; Cédric Gouy-Pailler; Yann Chevaleyre; Jamal Atif Man-in-The-Middle Attacks and Defense in a Power System Cyber-Physical Testbed.Patrick Wlazlo; Abhijeet Sahu; Zeyu Mao; Hao Huang; Ana Goulart; Katherine Davis; Saman Zonouz Sandwich Batch Normalization.Xinyu Gong; Wuyang Chen; Tianlong Chen; Zhangyang Wang 2021-02-21 The Effects of Image Distribution and Task on Adversarial Robustness.Owen Kunhardt; Arturo Deza; Tomaso Poggio A Zeroth-Order Block Coordinate Descent Algorithm for Huge-Scale Black-Box Optimization.HanQin Cai; Yuchen Lou; Daniel McKenzie; Wotao Yin 2021-02-20 Going Far Boosts Attack Transferability, but Do Not Do It.Sizhe Chen; Qinghua Tao; Zhixing Ye; Xiaolin Huang On Fast Adversarial Robustness Adaptation in Model-Agnostic Meta-Learning.Ren Wang; Kaidi Xu; Sijia Liu; Pin-Yu Chen; Tsui-Wei Weng; Chuang Gan; Meng Wang 2021-02-19 A PAC-Bayes Analysis of Adversarial Robustness.Guillaume IRIT Vidot; Paul LHC Viallard; Amaury LHC Habrard; Emilie LHC Morvant Effective and Efficient Vote Attack on Capsule Networks.Jindong Gu; Baoyuan Wu; Volker Tresp 2021-02-18 Verifying Probabilistic Specifications with Functional Lagrangians.Leonard Dj Berrada; Sumanth Dj Dathathri; Dj Krishnamurthy; Dvijotham; Robert Stanforth; Rudy Bunel; Jonathan Uesato; Sven Gowal; M. Pawan Kumar Random Projections for Improved Adversarial Robustness.Ginevra Carbone; Guido Sanguinetti; Luca Bortolussi Center Smoothing for Certifiably Robust Vector-Valued Functions.Aounon Kumar; Tom Goldstein Fortify Machine Learning Production Systems: Detect and Classify Adversarial Attacks.Matthew Ciolino; Josh Kalin; David Noever 2021-02-17 Bridging the Gap Between Adversarial Robustness and Optimization Bias.Fartash Faghri; Cristina Vasconcelos; David J. Fleet; Fabian Pedregosa; Nicolas Le Roux Consistent Non-Parametric Methods for Adaptive Robustness.Robi Bhattacharjee; Kamalika Chaudhuri Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids.Jiangnan Li; Yingyuan Yang; Jinyuan Stella Sun; Kevin Tomsovic; Hairong Qi Improving Hierarchical Adversarial Robustness of Deep Neural Networks.Avery Ma; Aladin Virmaux; Kevin Scaman; Juwei Lu 2021-02-16 Globally-Robust Neural Networks.Klas Leino; Zifan Wang; Matt Fredrikson A Law of Robustness for Weight-bounded Neural Networks.Hisham Husain; Borja Balle Just Noticeable Difference for Machine Perception and Generation of Regularized Adversarial Images with Minimal Perturbation.Adil Kaan Akan; Emre Akbas; Fatos T. Yarman Vural 2021-02-15 Data Profiling for Adversarial Training: On the Ruin of Problematic Data.Chengyu Dong; Liyuan Liu; Jingbo Shang Low Curvature Activations Reduce Overfitting in Adversarial Training.Vasu Singla; Sahil Singla; David Jacobs; Soheil Feizi Certifiably Robust Variational Autoencoders.Ben Barrett; Alexander Camuto; Matthew Willetts; Tom Rainforth Certified Robustness to Programmable Transformations in LSTMs.Yuhao Zhang; Aws Albarghouthi; Loris D'Antoni And/or trade-off in artificial neurons: impact on adversarial robustness.Alessandro Fontana Generating Structured Adversarial Attacks Using Frank-Wolfe Method.Ehsan Kazemi; Thomas Kerdreux; Liquang Wang Universal Adversarial Examples and Perturbations for Quantum Classifiers.Weiyuan Gong; Dong-Ling Deng 2021-02-14 Guided Interpolation for Adversarial Training.Chen Chen; Jingfeng Zhang; Xilie Xu; Tianlei Hu; Gang Niu; Gang Chen; Masashi Sugiyama Cross-modal Adversarial Reprogramming.Paarth Neekhara; Shehzeen Hussain; Jinglong Du; Shlomo Dubnov; Farinaz Koushanfar; Julian McAuley Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS.Felix Olowononi; Danda B. Rawat; Chunmei Liu Exploring Adversarial Robustness of Deep Metric Learning.Thomas Kobber Panum; Zi Wang; Pengyu Kan; Earlence Fernandes; Somesh Jha Adversarial Attack on Network Embeddings via Supervised Network Poisoning.Viresh Gupta; Tanmoy Chakraborty Perceptually Constrained Adversarial Attacks.Muhammad Zaid Hameed; Andras Gyorgy CAP-GAN: Towards_Adversarial_Robustness_with_Cycle-consistent_Attentional_Purification.Mingu Kang; Trung Quang Tran; Seungju Cho; Daeyoung Kim 2021-02-13 Mixed Nash Equilibria in the Adversarial Examples Game.Laurent Meunier; Meyer Scetbon; Rafael Pinot; Jamal Atif; Yann Chevaleyre Adversarial defense for automatic speaker verification by cascaded self-supervised learning models.Haibin Wu; Xu Li; Andy T. Liu; Zhiyong Wu; Helen Meng; Hung-yi Lee 2021-02-12 UAVs Path Deviation Attacks: Survey and Research Challenges.Francesco Betti Sorbelli; Mauro Conti; Cristina M. Pinotti; Giulio Rigoni Universal Adversarial Perturbations Through the Lens of Deep Steganography: Towards A Fourier Perspective.Chaoning Zhang; Philipp Benz; Adil Karjauv; In So Kweon Universal Adversarial Perturbations for Malware.Raphael Labaca-Castro; Luis Muñoz-González; Feargus Pendlebury; Gabi Dreo Rodosek; Fabio Pierazzi; Lorenzo Cavallaro 2021-02-11 Adversarially robust deepfake media detection using fused convolutional neural network predictions.Sohail Ahmed Khan; Alessandro Artusi; Hang Dai Defuse: Harnessing Unrestricted Adversarial Examples for Debugging Models Beyond Test Accuracy.Dylan Slack; Nathalie Rauschmayr; Krishnaram Kenthapadi RobOT: Robustness-Oriented Testing for Deep Learning Systems.Jingyi Wang; Jialuo Chen; Youcheng Sun; Xingjun Ma; Dongxia Wang; Jun Sun; Peng Cheng 2021-02-10 RoBIC: A benchmark suite for assessing classifiers robustness.Thibault Maho; Benoît Bonnet; Teddy Furon; Erwan Le Merrer CIFS: Improving Adversarial Robustness of CNNs via Channel-wise Importance-based Feature Selection.Hanshu Yan; Jingfeng Zhang; Gang Niu; Jiashi Feng; Vincent Y. F. Tan; Masashi Sugiyama Meta Federated Learning.Omid Aramoon; Pin-Yu Chen; Gang Qu; Yuan Tian Enhancing Real-World Adversarial Patches with 3D Modeling Techniques.Yael Mathov; Lior Rokach; Yuval Elovici Towards Certifying $\ell_\infty$ Robustness using Neural Networks with $\ell_\infty$-dist Neurons.Bohang Zhang; Tianle Cai; Zhou Lu; Di He; Liwei Wang Dompteur: Taming Audio Adversarial Examples.Thorsten Eisenhofer; Lea Schönherr; Joel Frank; Lars Speckemeier; Dorothea Kolossa; Thorsten Holz Adversarial Robustness: What fools you makes you stronger.Grzegorz Głuch; Rüdiger Urbanke Bayesian Inference with Certifiable Adversarial Robustness.Matthew Wicker; Luca Laurenti; Andrea Patane; Zhoutong Chen; Zheng Zhang; Marta Kwiatkowska 2021-02-09 Target Training Does Adversarial Training Without Adversarial Samples.Blerta Lindqvist Security and Privacy for Artificial Intelligence: Opportunities and Challenges.Ayodeji Oseni; Nour Moustafa; Helge Janicke; Peng Liu; Zahir Tari; Athanasios Vasilakos Adversarially Robust Classifier with Covariate Shift Adaptation.Jay Nandy; Sudipan Saha; Wynne Hsu; Mong Li Lee; Xiao Xiang Zhu "What's in the box?!": Deflecting Adversarial Attacks by Randomly Deploying Adversarially-Disjoint Models.Sahar Abdelnabi; Mario Fritz Adversarial Perturbations Are Not So Weird: Entanglement of Robust and Non-Robust Features in Neural Network Classifiers.Jacob M. Springer; Melanie Mitchell; Garrett T. Kenyon Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis.Fengting Li; Xuankai Liu; Xiaoli Zhang; Qi Li; Kun Sun; Kang Li Making Paper Reviewing Robust to Bid Manipulation Attacks.Ruihan Wu; Chuan Guo; Felix Wu; Rahul Kidambi; der Maaten Laurens van; Kilian Q. Weinberger 2021-02-08 Efficient Certified Defenses Against Patch Attacks on Image Classifiers.Jan Hendrik Metzen; Maksym Yatsura A Real-time Defense against Website Fingerprinting Attacks.Shawn Shan; Arjun Nitin Bhagoji; Haitao Zheng; Ben Y. Zhao Benford's law: what does it say on adversarial images?João G. Zago; Fabio L. Baldissera; Eric A. Antonelo; Rodrigo T. Saad Exploiting epistemic uncertainty of the deep learning models to generate adversarial samples.Omer Faruk Tuna; Ferhat Ozgur Catak; M. Taner Eskil 2021-02-07 Adversarial example generation with AdaBelief Optimizer and Crop Invariance.Bo Yang; Hengwei Zhang; Yuchen Zhang; Kaiyong Xu; Jindong Wang Adversarial Imaging Pipelines.Buu Phan; Fahim Mannan; Felix Heide 2021-02-06 SPADE: A Spectral Method for Black-Box Adversarial Robustness Evaluation.Wuxinlin Cheng; Chenhui Deng; Zhiqiang Zhao; Yaohui Cai; Zhiru Zhang; Zhuo Feng 2021-02-05 Corner Case Generation and Analysis for Safety Assessment of Autonomous Vehicles.Haowei Sun; Shuo Feng; Xintao Yan; Henry X. Liu Model Agnostic Answer Reranking System for Adversarial Question Answering.Sagnik Majumder; Chinmoy Samant; Greg Durrett Robust Single-step Adversarial Training with Regularizer.Lehui Xie; Yaopeng Wang; Jia-Li Yin; Ximeng Liu Understanding the Interaction of Adversarial Training with Noisy Labels.Jianing Zhu; Jingfeng Zhang; Bo Han; Tongliang Liu; Gang Niu; Hongxia Yang; Mohan Kankanhalli; Masashi Sugiyama Optimal Transport as a Defense Against Adversarial Attacks.Quentin Bouniot; Romaric Audigier; Angélique Loesch 2021-02-04 DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks.Chong Xiang; Prateek Mittal Adversarial Training Makes Weight Loss Landscape Sharper in Logistic Regression.Masanori Yamada; Sekitoshi Kanai; Tomoharu Iwata; Tomokatsu Takahashi; Yuki Yamanaka; Hiroshi Takahashi; Atsutoshi Kumagai Adversarial Robustness Study of Convolutional Neural Network for Lumbar Disk Shape Reconstruction from MR images.Jiasong Chen; Linchen Qian; Timur Urakov; Weiyong Gu; Liang Liang PredCoin: Defense against Query-based Hard-label Attack.Junfeng Guo; Yaswanth Yadlapalli; Thiele Lothar; Ang Li; Cong Liu Adversarial Attacks and Defenses in Physiological Computing: A Systematic Review.Dongrui Wu; Weili Fang; Yi Zhang; Liuqing Yang; Hanbin Luo; Lieyun Ding; Xiaodong Xu; Xiang Yu ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.Yugeng Liu; Rui Wen; Xinlei He; Ahmed Salem; Zhikun Zhang; Michael Backes; Cristofaro Emiliano De; Mario Fritz; Yang Zhang Audio Adversarial Examples: Attacks Using Vocal Masks.Lynnette Ng; Kai Yuan Tay; Wei Han Chua; Lucerne Loke; Danqi Ye; Melissa Chua 2021-02-03 Adversarially Robust Learning with Unknown Perturbation Sets.Omar Montasser; Steve Hanneke; Nathan Srebro IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks.Yixiang Wang; Jiqiang Liu; Xiaolin Chang; Jelena Mišić; Vojislav B. Mišić 2021-02-02 On Robustness of Neural Semantic Parsers.Shuo Huang; Zhuang Li; Lizhen Qu; Lei Pan Towards Robust Neural Networks via Close-loop Control.Zhuotong Chen; Qianxiao Li; Zheng Zhang Recent Advances in Adversarial Training for Adversarial Robustness.Tao Bai; Jinqi Luo; Jun Zhao; Bihan Wen; Qian Wang 2021-02-01 Fast Training of Provably Robust Neural Networks by SingleProp.Akhilan Boopathy; Tsui-Wei Weng; Sijia Liu; Pin-Yu Chen; Gaoyuan Zhang; Luca Daniel Towards Speeding up Adversarial Training in Latent Spaces.Yaguan Qian; Qiqi Shao; Tengteng Yao; Bin Wang; Shaoning Zeng; Zhaoquan Gu; Wassim Swaileh Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems.Alireza Bahramali; Milad Nasr; Amir Houmansadr; Dennis Goeckel; Don Towsley 2021-01-31 Deep Deterministic Information Bottleneck with Matrix-based Entropy Functional.Xi Yu; Shujian Yu; Jose C. Principe Towards Imperceptible Query-limited Adversarial Attacks with Perceptual Feature Fidelity Loss.Pengrui Quan; Ruiming Guo; Mani Srivastava Admix: Enhancing the Transferability of Adversarial Attacks.Xiaosen Wang; Xuanran He; Jingdong Wang; Kun He 2021-01-30 Cortical Features for Defense Against Adversarial Audio Attacks.Ilya Kavalerov; Frank Zheng; Wojciech Czaja; Rama Chellappa 2021-01-29 You Only Query Once: Effective Black Box Adversarial Attacks with Minimal Repeated Queries.Devin Willmott; Anit Kumar Sahu; Fatemeh Sheikholeslami; Filipe Condessa; Zico Kolter 2021-01-28 Increasing the Confidence of Deep Neural Networks by Coverage Analysis.Giulio Rossolini; Alessandro Biondi; Giorgio Carlo Buttazzo Adversarial Machine Learning Attacks on Condition-Based Maintenance Capabilities.Hamidreza Habibollahi Najaf Abadi Adversarial Attacks on Deep Learning Based Power Allocation in a Massive MIMO Network.B. R. Manoj; Meysam Sadeghi; Erik G. Larsson Adversarial Learning with Cost-Sensitive Classes.Haojing Shen; Sihong Chen; Ran Wang; Xizhao Wang 2021-01-27 Robust Android Malware Detection System against Adversarial Attacks using Q-Learning.Hemant Rathore; Sanjay K. Sahay; Piyush Nikam; Mohit Sewak Adversaries in Online Learning Revisited: with applications in Robust Optimization and Adversarial training.Sebastian Pokutta; Huan Xu Adversarial Stylometry in the Wild: Transferable Lexical Substitution Attacks on Author Profiling.Chris Emmery; Ákos Kádár; Grzegorz Chrupała Meta Adversarial Training.Jan Hendrik Metzen; Nicole Finnie; Robin Hutmacher Detecting Adversarial Examples by Input Transformations, Defense Perturbations, and Voting.Federico Nesti; Alessandro Biondi; Giorgio Buttazzo Improving Neural Network Robustness through Neighborhood Preserving Layers.Bingyuan Liu; Christopher Malon; Lingzhou Xue; Erik Kruus 2021-01-26 Blind Image Denoising and Inpainting Using Robust Hadamard Autoencoders.Rasika Karkare; Randy Paffenroth; Gunjan Mahindre Property Inference From Poisoning.Melissa Chase; Esha Ghosh; Saeed Mahloujifar Adversarial Vulnerability of Active Transfer Learning.Nicolas M. Müller; Konstantin Böttinger Introducing and assessing the explainable AI (XAI)method: SIDU.Satya M. Muddamsetty; Mohammad N. S. Jahromi; Andreea E. Ciontos; Laura M. Fenoy; Thomas B. Moeslund SkeletonVis: Interactive Visualization for Understanding Adversarial Attacks on Human Action Recognition Models.Haekyu Park; Zijie J. Wang; Nilaksh Das; Anindya S. Paul; Pruthvi Perumalla; Zhiyan Zhou; Duen Horng Chau The Effect of Class Definitions on the Transferability of Adversarial Attacks Against Forensic CNNs.Xinwei Zhao; Matthew C. Stamm Defenses Against Multi-Sticker Physical Domain Attacks on Classifiers.Xinwei Zhao; Matthew C. Stamm Investigating the significance of adversarial attacks and their relation to interpretability for radar-based human activity recognition systems.Utku Ozbulak; Baptist Vandersmissen; Azarakhsh Jalalvand; Ivo Couckuyt; Messem Arnout Van; Neve Wesley De Towards Universal Physical Attacks On Cascaded Camera-Lidar 3D Object Detection Models.Mazen Abdelfattah; Kaiwen Yuan; Z. Jane Wang; Rabab Ward 2021-01-25 Diverse Adversaries for Mitigating Bias in Training.Xudong Han; Timothy Baldwin; Trevor Cohn They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors.Sebastian Köhler; Giulio Lovisotto; Simon Birnbach; Richard Baker; Ivan Martinovic Probabilistic Robustness Analysis for DNNs based on PAC Learning.Renjue Li; Pengfei Yang; Cheng-Chao Huang; Bai Xue; Lijun Zhang Generalizing Adversarial Examples by AdaBelief Optimizer.Yixiang Wang; Jiqiang Liu; Xiaolin Chang Few-Shot Website Fingerprinting Attack.Mantun Chen; Yongjun Wang; Zhiquan Qin; Xiatian Zhu Understanding and Achieving Efficient Robustness with Adversarial Supervised Contrastive Learning.Anh Bui; Trung Le; He Zhao; Paul Montague; Seyit Camtepe; Dinh Phung 2021-01-23 A Transferable Anti-Forensic Attack on Forensic CNNs Using A Generative Adversarial Network.Xinwei Zhao; Chen Chen; Matthew C. Stamm A Comprehensive Evaluation Framework for Deep Model Robustness.Aishan Liu; Xianglong Liu; Jun Guo; Jiakai Wang; Yuqing Ma; Ze Zhao; Xinghai Gao; Gang Xiao Error Diffusion Halftoning Against Adversarial Examples.Shao-Yuan Lo; Vishal M. Patel 2021-01-22 Partition-Based Convex Relaxations for Certifying the Robustness of ReLU Neural Networks.Brendon G. Anderson; Ziye Ma; Jingqi Li; Somayeh Sojoudi Online Adversarial Purification based on Self-Supervision.Changhao Shi; Chester Holtz; Gal Mishne Generating Black-Box Adversarial Examples in Sparse Domain.Hadi Zanddizari; J. Morris Chang Adaptive Neighbourhoods for the Discovery of Adversarial Examples.Jay Morgan; Adeline Paiement; Arno Pauly; Monika Seisenberger 2021-01-21 Self-Adaptive Training: Bridging the Supervised and Self-Supervised Learning.Lang Huang; Chao Zhang; Hongyang Zhang Robust Reinforcement Learning on State Observations with Learned Optimal Adversary.Huan Zhang; Hongge Chen; Duane Boning; Cho-Jui Hsieh Adv-OLM: Generating Textual Adversaries via OLM.Vijit Malik; Ashwani Bhat; Ashutosh Modi A Person Re-identification Data Augmentation Method with Adversarial Defense Effect.Yunpeng Gong; Zhiyong Zeng; Liwen Chen; Yifan Luo; Bin Weng; Feng Ye Adversarial Attacks and Defenses for Speaker Identification Systems.Sonal Joshi; Jesús Villalba; Piotr Żelasko; Laureano Moro-Velázquez; Najim Dehak 2021-01-20 Fooling thermal infrared pedestrian detectors in real world using small bulbs.Xiaopei Zhu; Xiao Li; Jianmin Li; Zheyao Wang; Xiaolin Hu Adversarial Attacks for Tabular Data: Application to Fraud Detection and Imbalanced Data.Francesco Cartella; Orlando Anunciacao; Yuki Funabiki; Daisuke Yamaguchi; Toru Akishita; Olivier Elshocht Invariance, encodings, and generalization: learning identity effects with neural networks.S. Brugiapaglia; M. Liu; P. Tupper 2021-01-19 LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial Recognition.Valeriia Cherepanova; Micah Goldblum; Harrison Foley; Shiyuan Duan; John Dickerson; Gavin Taylor; Tom Goldstein A Search-Based Testing Framework for Deep Neural Networks of Source Code Embedding.Maryam Vahdat Pour; Zhuo Li; Lei Ma; Hadi Hemmati PICA: A Pixel Correlation-based Attentional Black-box Adversarial Attack.Jie Wang; Zhaoxia Yin; Jin Tang; Jing Jiang; Bin Luo Attention-Guided Black-box Adversarial Attacks with Large-Scale Multiobjective Evolutionary Optimization.Jie Wang; Zhaoxia Yin; Jing Jiang; Yang Du 2021-01-18 What Do Deep Nets Learn? Class-wise Patterns Revealed in the Input Space.Shihao Zhao; Xingjun Ma; Yisen Wang; James Bailey; Bo Li; Yu-Gang Jiang 2021-01-17 GraphAttacker: A General Multi-Task GraphAttack Framework.Jinyin Chen; Dunjie Zhang; Zhaoyan Ming; Kejie Huang Adversarial Interaction Attack: Fooling AI to Misinterpret Human Intentions.Nodens Koren; Qiuhong Ke; Yisen Wang; James Bailey; Xingjun Ma Exploring Adversarial Robustness of Multi-Sensor Perception Systems in Self Driving.James Tu; Huichen Li; Xinchen Yan; Mengye Ren; Yun Chen; Ming Liang; Eilyan Bitar; Ersin Yumer; Raquel Urtasun 2021-01-16 Adversarial Attacks On Multi-Agent Communication.James Tu; Tsunhsuan Wang; Jingkang Wang; Sivabalan Manivasagam; Mengye Ren; Raquel Urtasun Multi-objective Search of Robust Neural Architectures against Multiple Types of Adversarial Attacks.Jia Liu; Yaochu Jin 2021-01-15 Fundamental Tradeoffs in Distributionally Adversarial Training.Mohammad Mehrabi; Adel Javanmard; Ryan A. Rossi; Anup Rao; Tung Mai Data Impressions: Mining Deep Models to Extract Samples for Data-free Applications.Gaurav Kumar Nayak; Konda Reddy Mopuri; Saksham Jain; Anirban Chakraborty Black-box Adversarial Attacks in Autonomous Vehicle Technology.K Naveen Kumar; C Vishnu; Reshmi Mitra; C Krishna Mohan Heating up decision boundaries: isocapacitory saturation, adversarial scenarios and generalization bounds.Bogdan Georgiev; Lukas Franken; Mayukh Mukherjee 2021-01-14 Context-Aware Image Denoising with Auto-Threshold Canny Edge Detection to Suppress Adversarial Perturbation.Li-Yun Wang; Yeganeh Jalalpour; Wu-chi Feng Robusta: Robust AutoML for Feature Selection via Reinforcement Learning.Xiaoyang Wang; Bo Li; Yibo Zhang; Bhavya Kailkhura; Klara Nahrstedt Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks.Yige Li; Xixiang Lyu; Nodens Koren; Lingjuan Lyu; Bo Li; Xingjun Ma 2021-01-13 Untargeted, Targeted and Universal Adversarial Attacks and Defenses on Time Series.Pradeep Rathore; Arghya Basak; Sri Harsha Nistala; Venkataramana Runkana Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image.Xinghong Qin; Shunquan Tan; Bin Li; Weixuan Tang; Jiwu Huang 2021-01-12 Robustness Gym: Unifying the NLP Evaluation Landscape.Karan Goel; Nazneen Rajani; Jesse Vig; Samson Tan; Jason Wu; Stephan Zheng; Caiming Xiong; Mohit Bansal; Christopher Ré Small Input Noise is Enough to Defend Against Query-based Black-box Attacks.Junyoung Byun; Hyojun Go; Changick Kim Robustness of on-device Models: Adversarial Attack to Deep Learning Models on Android Apps.Yujin Huang; Han Hu; Chunyang Chen Random Transformation of Image Brightness for Adversarial Attack.Bo Yang; Kaiyong Xu; Hengjun Wang; Hengwei Zhang 2021-01-11 The Vulnerability of Semantic Segmentation Networks to Adversarial Attacks in Autonomous Driving: Enhancing Extensive Environment Sensing.Andreas Bär; Jonas Löhdefink; Nikhil Kapoor; Serin J. Varghese; Fabian Hüger; Peter Schlicht; Tim Fingscheidt 2021-01-10 Adversarially Robust and Explainable Model Compression with On-Device Personalization for Text Classification.Yao Qiang; Supriya Tumkur Suresh Kumar; Marco Brocanelli; Dongxiao Zhu 2021-01-08 Adversarial Attack Attribution: Discovering Attributable Signals in Adversarial ML Attacks.Marissa Dotter; Sherry Xie; Keith Manville; Josh Harguess; Colin Busho; Mikel Rodriguez DiPSeN: Differentially Private Self-normalizing Neural Networks For Adversarial Robustness in Federated Learning.Olakunle Ibitoye; M. Omair Shafiq; Ashraf Matrawy Exploring Adversarial Fake Images on Face Manifold.Dongze Li; Wei Wang; Hongxing Fan; Jing Dong 2021-01-07 The Effect of Prior Lipschitz Continuity on the Adversarial Robustness of Bayesian Neural Networks.Arno Blaas; Stephen J. Roberts Robust Text CAPTCHAs Using Adversarial Examples.Rulin Shao; Zhouxing Shi; Jinfeng Yi; Pin-Yu Chen; Cho-Jui Hsieh 2021-01-06 Adversarial Robustness by Design through Analog Computing and Synthetic Gradients.Alessandro Cappelli; Ruben Ohana; Julien Launay; Laurent Meunier; Iacopo Poli; Florent Krzakala Understanding the Error in Evaluating Adversarial Robustness.Pengfei Xia; Ziqiang Li; Hongjing Niu; Bin Li 2021-01-05 Noise Sensitivity-Based Energy Efficient and Robust Adversary Detection in Neural Networks.Rachel Sterneck; Abhishek Moitra; Priyadarshini Panda 2021-01-04 Fooling Object Detectors: Adversarial Attacks by Half-Neighbor Masks.Yanghao Zhang; Fu Wang; Wenjie Ruan Local Competition and Stochasticity for Adversarial Robustness in Deep Learning.Konstantinos P. Panousis; Sotirios Chatzis; Antonios Alexos; Sergios Theodoridis Local Black-box Adversarial Attacks: A Query Efficient Approach.Tao Xiang; Hangcheng Liu; Shangwei Guo; Tianwei Zhang; Xiaofeng Liao Robust Machine Learning Systems: Challenges, Current Trends, Perspectives, and the Road Ahead.Muhammad Shafique; Mahum Naseer; Theocharis Theocharides; Christos Kyrkou; Onur Mutlu; Lois Orosa; Jungwook Choi 2021-01-02 Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning.Ibrahim Yilmaz; Ambareen Siraj; Denis Ulybyshev 2020-12-31 Better Robustness by More Coverage: Adversarial Training with Mixup Augmentation for Robust Fine-tuning.Chenglei Si; Zhengyan Zhang; Fanchao Qi; Zhiyuan Liu; Yasheng Wang; Qun Liu; Maosong Sun Patch-wise++ Perturbation for Adversarial Targeted Attacks.Lianli Gao; Qilong Zhang; Jingkuan Song; Heng Tao Shen 2020-12-30 Temporally-Transferable Perturbations: Efficient, One-Shot Adversarial Attacks for Online Visual Object Trackers.Krishna Kanth Nakka; Mathieu Salzmann Beating Attackers At Their Own Games: Adversarial Example Detection Using Adversarial Gradient Directions.Yuhang Wu; Sunpreet S. Arora; Yanhong Wu; Hao Yang 2020-12-29 Black-box Adversarial Attacks on Monocular Depth Estimation Using Evolutionary Multi-objective Optimization.Renya Department of Information Science and Biomedical Engineering, Graduate School of Science and Engineering, Kagoshima University Daimo; Satoshi Department of Information Science and Biomedical Engineering, Graduate School of Science and Engineering, Kagoshima University Ono; Takahiro Department of Information Science and Biomedical Engineering, Graduate School of Science and Engineering, Kagoshima University Suzuki Generating Adversarial Examples in Chinese Texts Using Sentence-Pieces.Linyang Li; Yunfan Shao; Demin Song; Xipeng Qiu; Xuanjing Huang Improving Adversarial Robustness in Weight-quantized Neural Networks.Chang Song; Elias Fallon; Hai Li With False Friends Like These, Who Can Have Self-Knowledge?Lue Tao; Songcan Chen Generating Natural Language Attacks in a Hard Label Black Box Setting.Rishabh Maheshwary; Saket Maheshwary; Vikram Pudi 2020-12-28 Enhanced Regularizers for Attributional Robustness.Anindya Sarkar; Anirban Sarkar; Vineeth N Balasubramanian Analysis of Dominant Classes in Universal Adversarial Perturbations.Jon Vadillo; Roberto Santana; Jose A. Lozano 2020-12-27 Person Re-identification with Adversarial Triplet Embedding.Xinglu Wang My Teacher Thinks The World Is Flat! Interpreting Automatic Essay Scoring Mechanism.Swapnil Parekh; Yaman Kumar Singla; Changyou Chen; Junyi Jessy Li; Rajiv Ratn Shah 2020-12-26 Sparse Adversarial Attack to Object Detection.Jiayu Bao Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS.Mohit Sewak; Sanjay K. Sahay; Hemant Rathore 2020-12-25 Robustness, Privacy, and Generalization of Adversarial Training.Fengxiang He; Shaopeng Fu; Bohan Wang; Dacheng Tao A Simple Fine-tuning Is All You Need: Towards Robust Deep Learning Via Adversarial Fine-tuning.Ahmadreza Jeddi; Mohammad Javad Shafiee; Alexander Wong 2020-12-24 A Context Aware Approach for Generating Natural Language Attacks.Rishabh Maheshwary; Saket Maheshwary; Vikram Pudi Exploring Adversarial Examples via Invertible Neural Networks.Ruqi Bai; Saurabh Bagchi; David I. Inouye Improving the Certified Robustness of Neural Networks via Consistency Regularization.Mengting Xu; Tao Zhang; Zhongnian Li; Daoqiang Zhang Adversarial Momentum-Contrastive Pre-Training.Cong Xu; Min Yang Learning Robust Representation for Clustering through Locality Preserving Variational Discriminative Network.Ruixuan Luo; Wei Li; Zhiyuan Zhang; Ruihan Bao; Keiko Harimoto; Xu Sun 2020-12-23 The Translucent Patch: A Physical and Universal Attack on Object Detectors.Alon Zolfi; Moshe Kravchik; Yuval Elovici; Asaf Shabtai Gradient-Free Adversarial Attacks for Bayesian Neural Networks.Matthew Yuan; Matthew Wicker; Luca Laurenti SCOPE CPS: Secure Compiling of PLCs in Cyber-Physical Systems.Eyasu Getahun Chekole; Martin Ochoa; Sudipta Chattopadhyay Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems.Moshe Kravchik; Battista Biggio; Asaf Shabtai 2020-12-22 Learning to Initialize Gradient Descent Using Gradient Descent.Kartik Ahuja; Amit Dhurandhar; Kush R. Varshney Unadversarial Examples: Designing Objects for Robust Vision.Hadi Salman; Andrew Ilyas; Logan Engstrom; Sai Vemprala; Aleksander Madry; Ashish Kapoor Multi-shot NAS for Discovering Adversarially Robust Convolutional Neural Architectures at Targeted Capacities.Xuefei Ning; Junbo Zhao; Wenshuo Li; Tianchen Zhao; Huazhong Yang; Yu Wang On Frank-Wolfe Optimization for Adversarial Robustness and Interpretability.Theodoros Tsiligkaridis; Jay Roberts 2020-12-21 Genetic Adversarial Training of Decision Trees.Francesco Ranzato; Marco Zanella Incremental Verification of Fixed-Point Implementations of Neural Networks.Luiz Sena; Erickson Alves; Iury Bessa; Eddie Filho; Lucas Cordeiro Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring.Chenchen Zhao; Hao Li Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks.Chenchen Zhao; Hao Li On Success and Simplicity: A Second Look at Transferable Targeted Attacks.Zhengyu Zhao; Zhuoran Liu; Martha Larson Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification.Siyuan Cheng; Yingqi Liu; Shiqing Ma; Xiangyu Zhang Defence against adversarial attacks using classical and quantum-enhanced Boltzmann machines.Aidan Kehoe; Peter Wittek; Yanbo Xue; Alejandro Pozas-Kerstjens Self-Progressing Robust Training.Minhao Cheng; Pin-Yu Chen; Sijia Liu; Shiyu Chang; Cho-Jui Hsieh; Payel Das Adjust-free adversarial example generation in speech recognition using evolutionary multi-objective optimization under black-box condition.Shoma Ishida; Satoshi Ono 2020-12-20 Color Channel Perturbation Attacks for Fooling Convolutional Neural Networks and A Defense Against Such Attacks.Jayendra Kantipudi; Shiv Ram Dubey; Soumendu Chakraborty 2020-12-19 Sample Complexity of Adversarially Robust Linear Classification on Separated Data.Robi Bhattacharjee; Somesh Jha; Kamalika Chaudhuri 2020-12-18 Semantics and explanation: why counterfactual explanations produce adversarial examples in deep neural networks.Kieran Browne; Ben Swift ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries.Jinyin Chen; Zhen Wang; Haibin Zheng; Jun Xiao; Zhaoyan Ming AdvExpander: Generating Natural Language Adversarial Examples by Expanding Text.Zhihong Shao; Zitao Liu; Jiyong Zhang; Zhongqin Wu; Minlie Huang Adversarially Robust Estimate and Risk Analysis in Linear Regression.Yue Xing; Ruizhi Zhang; Guang Cheng RAILS: A Robust Adversarial Immune-inspired Learning System.Ren Wang; Tianqi Chen; Stephen Lindsly; Alnawaz Rehemtulla; Alfred Hero; Indika Rajapakse Efficient Training of Robust Decision Trees Against Adversarial Examples.Daniël Vos; Sicco Verwer On the human-recognizability phenomenon of adversarially trained deep image classifiers.Jonathan Helland; Nathan VanHoudnos 2020-12-17 Characterizing the Evasion Attackability of Multi-label Classifiers.Zhuo Yang; Yufei Han; Xiangliang Zhang A Hierarchical Feature Constraint to Camouflage Medical Adversarial Attacks.Qingsong Yao; Zecheng He; Yi Lin; Kai Ma; Yefeng Zheng; S. Kevin Zhou 2020-12-16 On the Limitations of Denoising Strategies as Adversarial Defenses.Zhonghan Niu; Zhaoxi Chen; Linyi Li; Yubin Yang; Bo Li; Jinfeng Yi 2020-12-15 FoggySight: A Scheme for Facial Lookup Privacy.Ivan Evtimov; Pascal Sturmfels; Tadayoshi Kohno FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems.Lu Chen; Jiao Sun; Wei Xu Amata: An Annealing Mechanism for Adversarial Training Acceleration.Nanyang Ye; Qianxiao Li; Xiao-Yun Zhou; Zhanxing Zhu 2020-12-14 Disentangled Information Bottleneck.Ziqi Pan; Li Niu; Jianfu Zhang; Liqing Zhang Adaptive Verifiable Training Using Pairwise Class Similarity.Shiqi Wang; Kevin Eykholt; Taesung Lee; Jiyong Jang; Ian Molloy Robustness Threats of Differential Privacy.Nurislam Tursynbek; Aleksandr Petiushko; Ivan Oseledets HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios.Hassan Ali; Surya Nepal; Salil S. Kanhere; Sanjay Jha Improving Adversarial Robustness via Probabilistically Compact Loss with Logit Constraints.Xin Li; Xiangrui Li; Deng Pan; Dongxiao Zhu Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model.Mohammadreza Ebrahimi; Ning Zhang; James Hu; Muhammad Taqi Raza; Hsinchun Chen Contrastive Learning with Adversarial Perturbations for Conditional Text Generation.Seanie Lee; Dong Bok Lee; Sung Ju Hwang 2020-12-13 Achieving Adversarial Robustness Requires An Active Teacher.Chao Ma; Lexing Ying 2020-12-12 Query-free Black-box Adversarial Attacks on Graphs.Jiarong Xu; Yizhou Sun; Xin Jiang; Yanhao Wang; Yang Yang; Chunping Wang; Jiangang Lu 2020-12-11 Closeness and Uncertainty Aware Adversarial Examples Detection in Adversarial Machine Learning.Omer Faruk Tuna; Ferhat Ozgur Catak; M. Taner Eskil Random Projections for Adversarial Attack Detection.Nathan Drenkow; Neil Fendley; Philippe Burlina 2020-12-10 GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking.Lilas Alrahis; Satwik Patnaik; Faiq Khalid; Muhammad Abdullah Hanif; Hani Saleh; Muhammad Shafique; Ozgur Sinanoglu Next Wave Artificial Intelligence: Robust, Explainable, Adaptable, Ethical, and Accountable.Odest Chadwicke Jenkins; Daniel Lopresti; Melanie Mitchell DSRNA: Differentiable Search of Robust Neural Architectures.Ramtin Hosseini; Xingyi Yang; Pengtao Xie I-GCN: Robust Graph Convolutional Network via Influence Mechanism.Haoxi Zhan; Xiaobing Pei An Empirical Review of Adversarial Defenses.Ayush Goel Robustness and Transferability of Universal Attacks on Compressed Models.Alberto G. Matachana; Kenneth T. Co; Luis Muñoz-González; David Martinez; Emil C. Lupu Geometric Adversarial Attacks and Defenses on 3D Point Clouds.Itai Lang; Uriel Kotlicki; Shai Avidan SPAA: Stealthy Projector-based Adversarial Attacks on Deep Image Classifiers.Bingyao Huang; Haibin Ling 2020-12-09 Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity.Yi Xiang Marcus Tan; Penny Chong; Jiamei Sun; Yuval Elovici; Alexander Binder Generating Out of Distribution Adversarial Attack using Latent Space Poisoning.Ujjwal Upadhyay; Prerana Mukherjee Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters.Rida El-Allami; Alberto Marchisio; Muhammad Shafique; Ihsen Alouani Composite Adversarial Attacks.Xiaofeng Mao; Yuefeng Chen; Shuhui Wang; Hang Su; Yuan He; Hui Xue 2020-12-08 Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective.Jingwei Sun; Ang Li; Binghui Wang; Huanrui Yang; Hai Li; Yiran Chen On 1/n neural representation and robustness.Josue Nassar; Piotr Aleksander Sokol; SueYeon Chung; Kenneth D. Harris; Il Memming Park Locally optimal detection of stochastic targeted universal adversarial perturbations.Amish Goel; Pierre Moulin A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models.Mohammed Hassanin; Nour Moustafa; Murat Tahtali Using Feature Alignment can Improve Clean Average Precision and Adversarial Robustness in Object Detection.Weipeng Xu; Hongcheng Huang EvaLDA: Efficient Evasion Attacks Towards Latent Dirichlet Allocation.Qi Zhou; Haipeng Chen; Yitao Zheng; Zhen Wang Overcomplete Representations Against Adversarial Videos.Shao-Yuan Lo; Jeya Maria Jose Valanarasu; Vishal M. Patel Mitigating the Impact of Adversarial Attacks in Very Deep Networks.Mohammed Hassanin; Ibrahim Radwan; Nour Moustafa; Murat Tahtali; Neeraj Kumar Reinforcement Based Learning on Classification Task Could Yield Better Generalization and Adversarial Accuracy.Shashi Kant Gupta 2020-12-07 A Singular Value Perspective on Model Robustness.Malhar Jere; Maghav Kumar; Farinaz Koushanfar Sparse Fooling Images: Fooling Machine Perception through Unrecognizable Images.Soichiro Kumano; Hiroshi Kera; Toshihiko Yamasaki Backpropagating Linearly Improves Transferability of Adversarial Examples.Yiwen Guo; Qizhang Li; Hao Chen Learning to Separate Clusters of Adversarial Representations for Robust Adversarial Detection.Byunggill Joe; Jihun Hamm; Sung Ju Hwang; Sooel Son; Insik Shin Reprogramming Language Models for Molecular Representation Learning.Ria Vinod; Pin-Yu Chen; Payel Das 2020-12-06 Black-box Model Inversion Attribute Inference Attacks on Classification Models.Shagufta Mehnaz; Ninghui Li; Elisa Bertino PAC-Learning for Strategic Classification.Ravi Sundaram; Anil Vullikanti; Haifeng Xu; Fan Yao 2020-12-05 Evaluating adversarial robustness in simulated cerebellum.Liu Yuezhang; Bo Li; Qifeng Chen 2020-12-04 Unsupervised Adversarially-Robust Representation Learning on Graphs.Jiarong Xu; Junru Chen; Yang Yang; Yizhou Sun; Chunping Wang; Jiangang Lu Advocating for Multiple Defense Strategies against Adversarial Examples.Alexandre Araujo; Laurent Meunier; Rafael Pinot; Benjamin Negrevergne Practical No-box Adversarial Attacks against DNNs.Qizhang Li; Yiwen Guo; Hao Chen Towards Natural Robustness Against Adversarial Examples.Haoyu Chu; Shikui Wei; Yao Zhao Kernel-convoluted Deep Neural Networks with Data Augmentation.Minjin Kim; Young-geun Kim; Dongha Kim; Yongdai Kim; Myunghee Cho Paik 2020-12-03 Ethical Testing in the Real World: Evaluating Physical Testing of Adversarial Machine Learning.Kendra Albert; Maggie Delano; Jonathon Penney; Afsaneh Rigot; Ram Shankar Siva Kumar FAT: Federated Adversarial Training.Giulio Zizzo; Ambrish Rawat; Mathieu Sinn; Beat Buesser An Empirical Study of Derivative-Free-Optimization Algorithms for Targeted Black-Box Attacks in Deep Neural Networks.Giuseppe Ughi; Vinayak Abrol; Jared Tanner Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers.Brian Kim; Yalin E. Sagduyu; Tugba Erpek; Kemal Davaslioglu; Sennur Ulukus Attribute-Guided Adversarial Training for Robustness to Natural Perturbations.Tejas Gokhale; Rushil Anirudh; Bhavya Kailkhura; Jayaraman J. Thiagarajan; Chitta Baral; Yezhou Yang 2020-12-02 From a Fourier-Domain Perspective on Adversarial Examples to a Wiener Filter Defense for Semantic Segmentation.Nikhil Kapoor; Andreas Bär; Serin Varghese; Jan David Schneider; Fabian Hüger; Peter Schlicht; Tim Fingscheidt Essential Features: Reducing the Attack Surface of Adversarial Perturbations with Robust Content-Aware Image Preprocessing.Ryan Feng; Wu-chi Feng; Atul Prakash Towards Defending Multiple Adversarial Perturbations via Gated Batch Normalization.Aishan Liu; Shiyu Tang; Xianglong Liu; Xinyun Chen; Lei Huang; Zhuozhuo Tu; Dawn Song; Dacheng Tao FenceBox: A Platform for Defeating Adversarial Examples with Data Augmentation Techniques.Han Qiu; Yi Zeng; Tianwei Zhang; Yong Jiang; Meikang Qiu How Robust are Randomized Smoothing based Defenses to Data Poisoning?Akshay Mehra; Bhavya Kailkhura; Pin-Yu Chen; Jihun Hamm 2020-12-01 Adversarial Robustness Across Representation Spaces.Pranjal Awasthi; George Yu; Chun-Sung Ferng; Andrew Tomkins; Da-Cheng Juan One-Pixel Attack Deceives Automatic Detection of Breast Cancer.Joni Korpihalkola; Tuomo Sipola; Samir Puuska; Tero Kokkonen Robustness Out of the Box: Compositional Representations Naturally Defend Against Black-Box Patch Attacks.Christian Cosgrove; Adam Kortylewski; Chenglin Yang; Alan Yuille Improving the Transferability of Adversarial Examples with the Adam Optimizer.Heng Yin; Hengwei Zhang; Jindong Wang; Ruiyu Dou Towards Imperceptible Adversarial Image Patches Based on Network Explanations.Yaguan Qian; Jiamin Wang; Bin Wang; Zhaoquan Gu; Xiang Ling; Chunming Wu 2020-11-30 Just One Moment: Inconspicuous One Frame Attack on Deep Action Recognition.Jaehui Hwang; Jun-Hyuk Kim; Jun-Ho Choi; Jong-Seok Lee Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses.Gaurang Sriramanan; Sravanti Addepalli; Arya Baburaj; R. Venkatesh Babu 2020-11-29 Architectural Adversarial Robustness: The Case for Deep Pursuit.George Cazenavette; Calvin Murdock; Simon Lucey SwitchX- Gmin-Gmax Switching for Energy-Efficient and Robust Implementation of Binary Neural Networks on Memristive Xbars.Abhiroop Bhattacharjee; Priyadarshini Panda A Targeted Universal Attack on Graph Convolutional Network.Jiazhu Dai; Weifeng Zhu; Xiangfeng Luo 2020-11-28 Cyberbiosecurity: DNA Injection Attack in Synthetic Biology.Dor Farbiash; Rami Puzis Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation.Ching-Chia Kao; Jhe-Bang Ko; Chun-Shien Lu FaceGuard: A Self-Supervised Defense Against Adversarial Face Images.Debayan Deb; Xiaoming Liu; Anil K. Jain 2020-11-27 3D Invisible Cloak.Mingfu Xue; Can He; Zhiyu Wu; Jian Wang; Zhe Liu; Weiqiang Liu SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images.Mingfu Xue; Shichang Sun; Zhiyu Wu; Can He; Jian Wang; Weiqiang Liu Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks.Mingfu Xue; Chengxiang Yuan; Can He; Zhiyu Wu; Yushu Zhang; Zhe Liu; Weiqiang Liu Fast and Complete: Enabling Complete Neural Network Verification with Rapid and Massively Parallel Incomplete Verifiers.Kaidi Xu; Huan Zhang; Shiqi Wang; Yihan Wang; Suman Jana; Xue Lin; Cho-Jui Hsieh Voting based ensemble improves robustness of defensive models.Devvrit; Minhao Cheng; Cho-Jui Hsieh; Inderjit Dhillon Generalized Adversarial Examples: Attacks and Defenses.Haojing Shen; Sihong Chen; Ran Wang; Xizhao Wang Robust and Natural Physical Adversarial Examples for Object Detectors.Mingfu Xue; Chengxiang Yuan; Can He; Jian Wang; Weiqiang Liu 2020-11-26 Regularization with Latent Space Virtual Adversarial Training.Genki Osada; Budrul Ahsan; Revoti Prasad Bora; Takashi Nishide Rethinking Uncertainty in Deep Learning: Whether and How it Improves Robustness.Yilun Jin; Lixin Fan; Kam Woh Ng; Ce Ju; Qiang Yang Exposing the Robustness and Vulnerability of Hybrid 8T-6T SRAM Memory Architectures to Adversarial Attacks in Deep Neural Networks.Abhishek Moitra; Priyadarshini Panda Robust Attacks on Deep Learning Face Recognition in the Physical World.Meng Shen; Hao Yu; Liehuang Zhu; Ke Xu; Qi Li; Xiaojiang Du Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect.Athena Sayles; Ashish Hooda; Mohit Gupta; Rahul Chatterjee; Earlence Fernandes 2020-11-25 Advancing diagnostic performance and clinical usability of neural networks via adversarial training and dual batch normalization.Tianyu Han; Sven Nebelung; Federico Pedersoli; Markus Zimmermann; Maximilian Schulze-Hagen; Michael Ho; Christoph Haarburger; Fabian Kiessling; Christiane Kuhl; Volkmar Schulz; Daniel Truhn Adversarial Evaluation of Multimodal Models under Realistic Gray Box Assumption.Ivan Evtimov; Russel Howes; Brian Dolhansky; Hamed Firooz; Cristian Canton Adversarial Attack on Facial Recognition using Visible Light.Morgan Frearson; Kien Nguyen SurFree: a fast surrogate-free black-box attack.Thibault Maho; Teddy Furon; Erwan Le Merrer 2020-11-24 Trust but Verify: Assigning Prediction Credibility by Counterfactual Constrained Learning.Luiz F. O. Chamon; Santiago Paternain; Alejandro Ribeiro Stochastic sparse adversarial attacks.Hatem Hajri; Manon Césaire; Théo Combey; Sylvain Lamprier; Patrick Gallinari On the Adversarial Robustness of 3D Point Cloud Classification.Jiachen Sun; Karl Koenig; Yulong Cao; Qi Alfred Chen; Z. Morley Mao Towards Imperceptible Universal Attacks on Texture Recognition.Yingpeng Deng; Lina J. Karam 2020-11-23 Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack.Rui Shu; Tianpei Xia; Laurie Williams; Tim Menzies Augmented Lagrangian Adversarial Attacks.Jérôme Rony; Eric Granger; Marco Pedersoli; Ismail Ben Ayed 2020-11-22 Learnable Boundary Guided Adversarial Training.Jiequan Cui; Shu Liu; Liwei Wang; Jiaya Jia Nudge Attacks on Point-Cloud DNNs.Yiren Zhao; Ilia Shumailov; Robert Mullins; Ross Anderson 2020-11-21 Spatially Correlated Patterns in Adversarial Images.Nandish Chattopadhyay; Lionell Yip En Zhi; Bryan Tan Bing Xing; Anupam Chattopadhyay A Neuro-Inspired Autoencoding Defense Against Adversarial Perturbations.Can Bakiskan; Metehan Cekic; Ahmet Dundar Sezer; Upamanyu Madhow 2020-11-20 Are Chess Discussions Racist? An Adversarial Hate Speech Data Set.Rupak Sarkar; Ashiqur R. KhudaBukhsh Detecting Universal Trigger's Adversarial Attack with Honeypot.Thai Le; Noseong Park; Dongwon Lee 2020-11-19 An Experimental Study of Semantic Continuity for Deep Learning Models.Shangxi Wu; Jitao Sang; Xian Zhao; Lizhang Chen Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams.Chawin Sitawarin; Evgenios M. Kornaropoulos; Dawn Song; David Wagner Adversarial Threats to DeepFake Detection: A Practical Perspective.Paarth Neekhara; Brian Dolhansky; Joanna Bitton; Cristian Canton Ferrer Multi-Task Adversarial Attack.Pengxin Guo; Yuancheng Xu; Baijiong Lin; Yu Zhang Latent Adversarial Debiasing: Mitigating Collider Bias in Deep Neural Networks.Luke Darlow; Stanisław Jastrzębski; Amos Storkey 2020-11-18 Robustified Domain Adaptation.Jiajin Zhang; Hanqing Chao; Pingkun Yan Adversarial collision attacks on image hashing functions.Brian Dolhansky; Cristian Canton Ferrer Contextual Fusion For Adversarial Robustness.Aiswarya Akumalla; Seth Haney; Maksim Bazhenov Adversarial Turing Patterns from Cellular Automata.Nurislam Tursynbek; Ilya Vilkoviskiy; Maria Sindeeva; Ivan Oseledets Self-Gradient Networks.Hossein Aboutalebi; Mohammad Javad Shafiee Alexander Wong Adversarial Profiles: Detecting Out-Distribution & Adversarial Samples in Pre-trained CNNs.Arezoo Rajabi; Rakesh B. Bobba 2020-11-17 FoolHD: Fooling speaker identification by Highly imperceptible adversarial Disturbances.Ali Shahin Shamsabadi; Francisco Sepúlveda Teixeira; Alberto Abad; Bhiksha Raj; Andrea Cavallaro; Isabel Trancoso SIENA: Stochastic Multi-Expert Neural Patcher.Thai Le; Noseong Park; Dongwon Lee Shaping Deep Feature Space towards Gaussian Mixture for Visual Classification.Weitao Wan; Jiansheng Chen; Cheng Yu; Tong Wu; Yuanyi Zhong; Ming-Hsuan Yang Generating universal language adversarial examples by understanding and enhancing the transferability across neural models.Liping Yuan; Xiaoqing Zheng; Yi Zhou; Cho-Jui Hsieh; Kai-wei Chang; Xuanjing Huang 2020-11-16 MAAC: Novel Alert Correlation Method To Detect Multi-step Attack.Xiaoyu Wang; Lei Yu; Houhua He; Xiaorui Gong Enforcing robust control guarantees within neural network policies.Priya L. Donti; Melrose Roderick; Mahyar Fazlyab; J. Zico Kolter Adversarially Robust Classification based on GLRT.Bhagyashree Puranik; Upamanyu Madhow; Ramtin Pedarsani Combining GANs and AutoEncoders for Efficient Anomaly Detection.Fabio ISTI CNR, Pisa, Italy Carrara; Giuseppe ISTI CNR, Pisa, Italy Amato; Luca ISTI CNR, Pisa, Italy Brombin; Fabrizio ISTI CNR, Pisa, Italy Falchi; Claudio ISTI CNR, Pisa, Italy Gennaro Extreme Value Preserving Networks.Mingjie Sun; Jianguo Li; Changshui Zhang 2020-11-15 Almost Tight L0-norm Certified Robustness of Top-k Predictions against Adversarial Perturbations.Jinyuan Jia; Binghui Wang; Xiaoyu Cao; Hongbin Liu; Neil Zhenqiang Gong Towards Understanding the Regularization of Adversarial Robustness on Neural Networks.Yuxin Wen; Shuai Li; Kui Jia Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks.MaungMaung AprilPyone; Hitoshi Kiya 2020-11-14 Audio-Visual Event Recognition through the lens of Adversary.Juncheng B Li; Kaixin Ma; Shuhui Qu; Po-Yao Huang; Florian Metze 2020-11-13 Transformer-Encoder Detector Module: Using Context to Improve Robustness to Adversarial Attacks on Object Detection.Faisal Alamri; Sinan Kalkan; Nicolas Pugeault Query-based Targeted Action-Space Adversarial Policies on Deep Reinforcement Learning Agents.Xian Yeow Lee; Yasaman Esfandiari; Kai Liang Tan; Soumik Sarkar 2020-11-12 Adversarial Robustness Against Image Color Transformation within Parametric Filter Space.Zhengyu Zhao; Zhuoran Liu; Martha Larson Sparse PCA: Algorithms, Adversarial Perturbations and Certificates.Tommaso d'Orsi; Pravesh K. Kothari; Gleb Novikov; David Steurer 2020-11-11 Adversarial images for the primate brain.Li Yuan; Will Xiao; Gabriel Kreiman; Francis E. H. Tay; Jiashi Feng; Margaret S. Livingstone Detecting Adversarial Patches with Class Conditional Reconstruction Networks.Perry Deng; Mohammad Saidur Rahman; Matthew Wright 2020-11-10 Efficient and Transferable Adversarial Examples from Bayesian Neural Networks.Martin Gubri; Maxime Cordy; Mike Papadakis; Yves Le Traon 2020-11-09 Solving Inverse Problems With Deep Neural Networks -- Robustness Included?Martin Genzel; Jan Macdonald; Maximilian März 2020-11-07 Adversarial Black-Box Attacks On Text Classifiers Using Multi-Objective Genetic Optimization Guided By Deep Networks.Alex Mathai; Shreya Khare; Srikanth Tamilselvam; Senthil Mani Bridging the Performance Gap between FGSM and PGD Adversarial Training.Tianjin Huang; Vlado Menkovski; Yulong Pei; Mykola Pechenizkiy 2020-11-06 Single-Node Attack for Fooling Graph Neural Networks.Ben Finkelshtein; Chaim Baskin; Evgenii Zheltonozhskii; Uri Alon A survey on practical adversarial examples for malware classifiers.Daniel Park; Bülent Yener 2020-11-05 A Black-Box Attack Model for Visually-Aware Recommender Systems.Rami Cohen; Oren Sar Shalom; Dietmar Jannach; Amihood Amir Data Augmentation via Structured Adversarial Perturbations.Calvin Luo; Hossein Mobahi; Samy Bengio Defense-friendly Images in Adversarial Attacks: Dataset and Metrics forPerturbation Difficulty.Camilo Pestana; Wei Liu; David Glance; Ajmal Mian Dynamically Sampled Nonlocal Gradients for Stronger Adversarial Attacks.Leo Schwinn; An Nguyen; René Raab; Dario Zanca; Bjoern Eskofier; Daniel Tenbrinck; Martin Burger 2020-11-03 MalFox: Camouflaged Adversarial Malware Example Generation Based on C-GANs Against Black-Box Detectors.Fangtian Zhong; Xiuzhen Cheng; Dongxiao Yu; Bei Gong; Shuaiwen Song; Jiguo Yu You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning.Shitong Zhu; Shasha Li; Zhongjie Wang; Xun Chen; Zhiyun Qian; Srikanth V. Krishnamurthy; Kevin S. Chan; Ananthram Swami Detecting Word Sense Disambiguation Biases in Machine Translation for Model-Agnostic Adversarial Attacks.Denis Emelin; Ivan Titov; Rico Sennrich Penetrating RF Fingerprinting-based Authentication with a Generative Adversarial Attack.Samurdhi Karunaratne; Enes Krijestorac; Danijela Cabric Recent Advances in Understanding Adversarial Robustness of Deep Neural Networks.Tao Bai; Jinqi Luo; Jun Zhao A Tunable Robust Pruning Framework Through Dynamic Network Rewiring of DNNs.Souvik Kundu; Mahdi Nazemi; Peter A. Beerel; Massoud Pedram 2020-11-02 Adversarial Examples in Constrained Domains.Ryan Sheatsley; Nicolas Papernot; Michael Weisman; Gunjan Verma; Patrick McDaniel Frequency-based Automated Modulation Classification in the Presence of Adversaries.Rajeev Sahay; Christopher G. Brinton; David J. Love Robust Algorithms for Online Convex Problems via Primal-Dual.Marco Molinaro Trustworthy AI.Richa Singh; Mayank Vatsa; Nalini Ratha 2020-11-01 LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud-based Deep Networks.Hang Zhou; Dongdong Chen; Jing Liao; Weiming Zhang; Kejiang Chen; Xiaoyi Dong; Kunlin Liu; Gang Hua; Nenghai Yu Vulnerability of the Neural Networks Against Adversarial Examples: A Survey.Rui Zhao 2020-10-31 MAD-VAE: Manifold Awareness Defense Variational Autoencoder.Frederick Morlock; Dingsu Wang 2020-10-30 Adversarial Attacks on Optimization based Planners.Sai Vemprala; Ashish Kapoor Adversarial Robust Training in MRI Reconstruction.Francesco Calivá; Kaiyang Cheng; Rutwik Shah; Valentina Pedoia Integer Programming-based Error-Correcting Output Code Design for Robust Classification.Samarth Gupta; Saurabh Amin Leveraging Extracted Model Adversaries for Improved Black Box Attacks.Naveen Jafer Nizar; Ari Kobren EEG-Based Brain-Computer Interfaces Are Vulnerable to Backdoor Attacks.Lubin Meng; Jian Huang; Zhigang Zeng; Xue Jiang; Shan Yu; Tzyy-Ping Jung; Chin-Teng Lin; Ricardo Chavarriaga; Dongrui Wu Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks.Dorjan Hitaj; Briland Hitaj; Sushil Jajodia; Luigi V. Mancini Perception Improvement for Free: Exploring Imperceptible Black-box Adversarial Attacks on Image Classification.Yongwei Wang; Mingquan Feng; Rabab Ward; Z. Jane Wang; Lanjun Wang 2020-10-29 Volumetric Medical Image Segmentation: A 3D Deep Coarse-to-fine Framework and Its Adversarial Examples.Yingwei Li; Zhuotun Zhu; Yuyin Zhou; Yingda Xia; Wei Shen; Elliot K. Fishman; Alan L. Yuille Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection.Yongwei Wang; Xin Ding; Li Ding; Rabab Ward; Z. Jane Wang Can the state of relevant neurons in a deep neural networks serve as indicators for detecting adversarial attacks?Roger Granda; Tinne Tuytelaars; Jose Oramas Reliable Graph Neural Networks via Robust Aggregation.Simon Geisler; Daniel Zügner; Stephan Günnemann Passport-aware Normalization for Deep Model Protection.Jie Zhang; Dongdong Chen; Jing Liao; Weiming Zhang; Gang Hua; Nenghai Yu Robustifying Binary Classification to Adversarial Perturbation.Fariborz Salehi; Babak Hassibi Beyond cross-entropy: learning highly separable feature distributions for robust and accurate classification.Arslan Ali; Andrea Migliorati; Tiziano Bianchi; Enrico Magli WaveTransform: Crafting Adversarial Examples via Input Decomposition.Divyam Anshumaan; Akshay Agarwal; Mayank Vatsa; Richa Singh 2020-10-28 Most ReLU Networks Suffer from $\ell^2$ Adversarial Perturbations.Amit Daniely; Hadas Schacham Evaluating Robustness of Predictive Uncertainty Estimation: Are Dirichlet-based Models Reliable?Anna-Kathrin Kopetzki; Bertrand Charpentier; Daniel Zügner; Sandhya Giri; Stephan Günnemann Object Hider: Adversarial Patch Attack Against Object Detectors.Yusheng Zhao; Huanqian Yan; Xingxing Wei Transferable Universal Adversarial Perturbations Using Generative Models.Atiye Sadat Hashemi; Andreas Bär; Saeed Mozaffari; Tim Fingscheidt 2020-10-27 Fast Local Attack: Generating Local Adversarial Examples for Object Detectors.Quanyu Liao; Xin Wang; Bin Kong; Siwei Lyu; Youbing Yin; Qi Song; Xi Wu Anti-perturbation of Online Social Networks by Graph Label Transition.Jun Zhuang; Mohammad Al Hasan 2020-10-26 Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes.Jinyuan Jia; Binghui Wang; Neil Zhenqiang Gong GreedyFool: Distortion-Aware Sparse Adversarial Attack.Xiaoyi Dong; Dongdong Chen; Jianmin Bao; Chuan Qin; Lu Yuan; Weiming Zhang; Nenghai Yu; Dong Chen Robust Pre-Training by Adversarial Contrastive Learning.Ziyu Jiang; Tianlong Chen; Ting Chen; Zhangyang Wang Robustness May Be at Odds with Fairness: An Empirical Study on Class-wise Accuracy.Philipp Benz; Chaoning Zhang; Adil Karjauv; In So Kweon Versatile Verification of Tree Ensembles.Laurens Devos; Wannes Meert; Jesse Davis 2020-10-25 Attack Agnostic Adversarial Defense via Visual Imperceptible Bound.Saheb Chhabra; Akshay Agarwal; Richa Singh; Mayank Vatsa Dynamic Adversarial Patch for Evading Object Detection Models.Shahar Hoory; Tzvika Shapira; Asaf Shabtai; Yuval Elovici Asymptotic Behavior of Adversarial Training in Binary Classification.Hossein Taheri; Ramtin Pedarsani; Christos Thrampoulidis 2020-10-24 Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations.Tal Ben Senior; Yael Mathov; Asaf Shabtai; Yuval Elovici ATRO: Adversarial Training with a Rejection Option.Masahiro Kato; Zhenghang Cui; Yoshihiro Fukuhara Are Adversarial Examples Created Equal? A Learnable Weighted Minimax Risk for Robustness under Non-uniform Attacks.Huimin Zeng; Chen Zhu; Tom Goldstein; Furong Huang 2020-10-23 Improving Robustness by Augmenting Training Sentences with Predicate-Argument Structures.Nafise Sadat Moosavi; Boer Marcel de; Prasetya Ajie Utama; Iryna Gurevych Learn Robust Features via Orthogonal Multi-Path.Kun Fang; Yingwen Wu; Tao Li; Xiaolin Huang; Jie Yang 2020-10-22 Contrastive Learning with Adversarial Examples.Chih-Hui Ho; Nuno Vasconcelos Adversarial Attacks on Binary Image Recognition Systems.Eric Balkanski; Harrison Chase; Kojin Oshiba; Alexander Rilee; Yaron Singer; Richard Wang Rewriting Meaningful Sentences via Conditional BERT Sampling and an application on fooling text classifiers.Lei Xu; Ivan Ramirez; Kalyan Veeramachaneni An Efficient Adversarial Attack for Tree Ensembles.Chong Zhang; Huan Zhang; Cho-Jui Hsieh Adversarial Robustness of Supervised Sparse Coding.Jeremias Sulam; Ramchandran Muthukumar; Raman Arora Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming.Sumanth Dathathri; Krishnamurthy Dvijotham; Alexey Kurakin; Aditi Raghunathan; Jonathan Uesato; Rudy Bunel; Shreya Shankar; Jacob Steinhardt; Ian Goodfellow; Percy Liang; Pushmeet Kohli Defense-guided Transferable Adversarial Attacks.Zifei Zhang; Kai Qiao; Jian Chen; Ningning Liang Once-for-All Adversarial Training: In-Situ Tradeoff between Robustness and Accuracy for Free.Haotao Wang; Tianlong Chen; Shupeng Gui; Ting-Kuei Hu; Ji Liu; Zhangyang Wang 2020-10-21 Adversarial Attacks on Deep Algorithmic Trading Policies.Yaser Faghan; Nancirose Piazza; Vahid Behzadan; Ali Fathi Maximum Mean Discrepancy is Aware of Adversarial Attacks.Ruize Gao; Feng Liu; Jingfeng Zhang; Bo Han; Tongliang Liu; Gang Niu; Masashi Sugiyama Precise Statistical Analysis of Classification Accuracies for Adversarial Training.Adel Javanmard; Mahdi Soltanolkotabi Learning Black-Box Attackers with Transferable Priors and Query Feedback.Jiancheng Yang; Yangzhou Jiang; Xiaoyang Huang; Bingbing Ni; Chenglong Zhao Class-Conditional Defense GAN Against End-to-End Speech Attacks.Mohammad Esmaeilpour; Patrick Cardinal; Alessandro Lameiras Koerich A Distributional Robustness Certificate by Randomized Smoothing.Jungang Yang; Liyao Xiang; Ruidong Chen; Yukun Wang; Wei Wang; Xinbing Wang 2020-10-20 Preventing Personal Data Theft in Images with Adversarial ML.Thomas Cilloni; Wei Wang; Charles Walter; Charles Fleming Towards Understanding the Dynamics of the First-Order Adversaries.Zhun Deng; Hangfeng He; Jiaoyang Huang; Weijie J. Su Robust Neural Networks inspired by Strong Stability Preserving Runge-Kutta methods.Byungjoo Kim; Bryce Chudomelka; Jinyoung Park; Jaewoo Kang; Youngjoon Hong; Hyunwoo J. Kim Boosting Gradient for White-Box Adversarial Attacks.Hongying Liu; Zhenyu Zhou; Fanhua Shang; Xiaoyu Qi; Yuanyuan Liu; Licheng Jiao Tight Second-Order Certificates for Randomized Smoothing.Alexander Levine; Aounon Kumar; Thomas Goldstein; Soheil Feizi 2020-10-19 A Survey of Machine Learning Techniques in Adversarial Image Forensics.Ehsan Nowroozi; Ali Dehghantanha; Reza M. Parizi; Kim-Kwang Raymond Choo Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification.Erwin Quiring; Lukas Pirch; Michael Reimsbach; Daniel Arp; Konrad Rieck RobustBench: a standardized adversarial robustness benchmark.Francesco Croce; Maksym Andriushchenko; Vikash Sehwag; Nicolas Flammarion; Mung Chiang; Prateek Mittal; Matthias Hein Optimism in the Face of Adversity: Understanding and Improving Deep Learning through Adversarial Robustness.Guillermo Ortiz-Jimenez; Apostolos Modas; Seyed-Mohsen Moosavi-Dezfooli; Pascal Frossard Verifying the Causes of Adversarial Examples.Honglin Li; Yifei Fan; Frieder Ganz; Anthony Yezzi; Payam Barnaghi When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders.Elior Nehemya; Yael Mathov; Asaf Shabtai; Yuval Elovici FLAG: Adversarial Data Augmentation for Graph Neural Networks.Kezhi Kong; Guohao Li; Mucong Ding; Zuxuan Wu; Chen Zhu; Bernard Ghanem; Gavin Taylor; Tom Goldstein 2020-10-18 Poisoned classifiers are not only backdoored, they are fundamentally broken.Mingjie Sun; Siddhant Agarwal; J. Zico Kolter FADER: Fast Adversarial Example Rejection.Francesco Crecchi; Marco Melis; Angelo Sotgiu; Davide Bacciu; Battista Biggio 2020-10-17 A Generative Model based Adversarial Security of Deep Learning and Linear Classifier Models.erhat Ozgur Catak; Samed Sivaslioglu; Kevser Sahinbas A Stochastic Neural Network for Attack-Agnostic Adversarial Robustness.Panagiotis Eustratiadis; Henry Gouk; Da Li; Timothy Hospedales Finding Physical Adversarial Examples for Autonomous Driving with Fast and Differentiable Image Compositing.Jinghan Yang; Adith Boloor; Ayan Chakrabarti; Xuan Zhang; Yevgeniy Vorobeychik 2020-10-16 DPAttack: Diffused Patch Attacks against Universal Object Detection.Shudeng Wu; Tao Dai; Shu-Tao Xia Mischief: A Simple Black-Box Attack Against Transformer Architectures.Wynter Adrian de Learning Robust Algorithms for Online Allocation Problems Using Adversarial Training.Goran Zuzic; Di Wang; Aranyak Mehta; D. Sivakumar 2020-10-15 Certifying Neural Network Robustness to Random Input Noise from Samples.Brendon G. Anderson; Somayeh Sojoudi Adversarial Images through Stega Glasses.Benoît CRIStAL Bonnet; Teddy CRIStAL Furon; Patrick CRIStAL Bas A Hamiltonian Monte Carlo Method for Probabilistic Adversarial Attack and Learning.Hongjun Wang; Guanbin Li; Xiaobai Liu; Liang Lin Generalizing Universal Adversarial Attacks Beyond Additive Perturbations.Yanghao Zhang; Wenjie Ruan; Fu Wang; Xiaowei Huang Overfitting or Underfitting? Understand Robustness Drop in Adversarial Training.Zichao Li; Liyuan Liu; Chengyu Dong; Jingbo Shang Maximum-Entropy Adversarial Data Augmentation for Improved Generalization and Robustness.Long Zhao; Ting Liu; Xi Peng; Dimitris Metaxas Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks.Jiangnan Li; Yingyuan Yang; Jinyuan Stella Sun Progressive Defense Against Adversarial Attacks for Deep Learning as a Service in Internet of Things.Ling Wang; Cheng Zhang; Zejian Luo; Chenguang Liu; Jie Liu; Xi Zheng; Athanasios Vasilakos 2020-10-14 Pair the Dots: Jointly Examining Training History and Test Stimuli for Model Interpretability.Yuxian Meng; Chun Fan; Zijun Sun; Eduard Hovy; Fei Wu; Jiwei Li Towards Resistant Audio Adversarial Examples.Tom Dörr; Karla Markert; Nicolas M. Müller; Konstantin Böttinger An Adversarial Attack against Stacked Capsule Autoencoder.Jiazhu Dai; Siwei Xiong Explain2Attack: Text Adversarial Attacks via Cross-Domain Interpretability.Mahmoud Hossam; Trung Le; He Zhao; Dinh Phung GreedyFool: Multi-Factor Imperceptibility and Its Application to Designing Black-box Adversarial Example Attack.Hui Liu; Bo Zhao; Jiabao Guo; Yang An; Peng Liu 2020-10-13 Toward Few-step Adversarial Training from a Frequency Perspective.Hans Shih-Han Wang; Cory Cornelius; Brandon Edwards; Jason Martin Higher-Order Certification for Randomized Smoothing.Jeet Mohapatra; Ching-Yun Ko; Tsui-Wei Weng; Pin-Yu Chen; Sijia Liu; Luca Daniel Linking average- and worst-case perturbation robustness via class selectivity and dimensionality.Matthew L. Leavitt; Ari Morcos 2020-10-12 Universal Model for 3D Medical Image Analysis.Xiaoman Zhang; Ya Zhang; Xiaoyun Zhang; Yanfeng Wang To be Robust or to be Fair: Towards Fairness in Adversarial Training.Han Xu; Xiaorui Liu; Yaxin Li; Jiliang Tang Towards Understanding Pixel Vulnerability under Adversarial Attacks for Images.He Zhao; Trung Le; Paul Montague; Vel Olivier De; Tamas Abraham; Dinh Phung Shape-Texture Debiased Neural Network Training.Yingwei Li; Qihang Yu; Mingxing Tan; Jieru Mei; Peng Tang; Wei Shen; Alan Yuille; Cihang Xie On the Power of Abstention and Data-Driven Decision Making for Adversarial Robustness.Maria-Florina Balcan; Avrim Blum; Dravyansh Sharma; Hongyang Zhang From Hero to Z\'eroe: A Benchmark of Low-Level Adversarial Attacks.Steffen Eger; Yannik Benz EFSG: Evolutionary Fooling Sentences Generator.Giovanni Marco Di; Marco Brambilla 2020-10-11 Gradient-based Analysis of NLP Models is Manipulable.Junlin Wang; Jens Tuyls; Eric Wallace; Sameer Singh IF-Defense: 3D Adversarial Point Cloud Defense via Implicit Function based Restoration.Ziyi Wu; Yueqi Duan; He Wang; Qingnan Fan; Leonidas J. Guibas 2020-10-10 Is It Time to Redefine the Classification Task for Deep Neural Networks?Keji Han; Yun Li Regularizing Neural Networks via Adversarial Model Perturbation. (1%)Yaowei Zheng; Richong Zhang; Yongyi Mao 2020-10-09 Understanding Spatial Robustness of Deep Neural Networks.Ziyuan Zhong; Yuchi Tian; Baishakhi Ray How Does Mixup Help With Robustness and Generalization?Linjun Zhang; Zhun Deng; Kenji Kawaguchi; Amirata Ghorbani; James Zou 2020-10-08 Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation.Federico Barbero; Feargus Pendlebury; Fabio Pierazzi; Lorenzo Cavallaro Improve Adversarial Robustness via Weight Penalization on Classification Layer.Cong Xu; Dan Li; Min Yang A Unified Approach to Interpreting and Boosting Adversarial Transferability.Xin Wang; Jie Ren; Shuyun Lin; Xiangming Zhu; Yisen Wang; Quanshi Zhang Improved Techniques for Model Inversion Attacks.Si Chen; Ruoxi Jia; Guo-Jun Qi Affine-Invariant Robust Training.Oriol Barbany Mayor Targeted Attention Attack on Deep Learning Models in Road Sign Recognition.Xinghao Yang; Weifeng Liu; Shengli Zhang; Wei Liu; Dacheng Tao Gaussian MRF Covariance Modeling for Efficient Black-Box Adversarial Attacks.Anit Kumar Sahu; Satya Narayan Shukla; J. Zico Kolter 2020-10-07 Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption.Simon Oya; Florian Kerschbaum Learning Clusterable Visual Features for Zero-Shot Recognition.Jingyi Xu; Zhixin Shu; Dimitris Samaras Don't Trigger Me! A Triggerless Backdoor Attack Against Deep Neural Networks.Ahmed Salem; Michael Backes; Yang Zhang Revisiting Batch Normalization for Improving Corruption Robustness.Philipp Benz; Chaoning Zhang; Adil Karjauv; In So Kweon Batch Normalization Increases Adversarial Vulnerability: Disentangling Usefulness and Robustness of Model Features.Philipp Benz; Chaoning Zhang; In So Kweon Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks.Bedeuro Kim; Alsharif Abuadbba; Yansong Gao; Yifeng Zheng; Muhammad Ejaz Ahmed; Hyoungshick Kim; Surya Nepal Global Optimization of Objective Functions Represented by ReLU Networks.Christopher A. Strong; Haoze Wu; Aleksandar Zeljić; Kyle D. Julian; Guy Katz; Clark Barrett; Mykel J. Kochenderfer CD-UAP: Class Discriminative Universal Adversarial Perturbation.Chaoning Zhang; Philipp Benz; Tooba Imtiaz; In So Kweon Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples.Eden Levy; Yael Mathov; Ziv Katzir; Asaf Shabtai; Yuval Elovici Double Targeted Universal Adversarial Perturbations.Philipp Benz; Chaoning Zhang; Tooba Imtiaz; In So Kweon Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples.Sven Gowal; Chongli Qin; Jonathan Uesato; Timothy Mann; Pushmeet Kohli Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems.AKM Iqtidar Newaz; Nur Imtiazul Haque; Amit Kumar Sikder; Mohammad Ashiqur Rahman; A. Selcuk Uluagac Adversarial attacks on audio source separation.Naoya Takahashi; Shota Inoue; Yuki Mitsufuji 2020-10-06 Visualizing Color-wise Saliency of Black-Box Image Classification Models.Yuhki SenseTime Japan Hatakeyama; Hiroki SenseTime Japan Sakuma; Yoshinori SenseTime Japan Konishi; Kohei Kyoto University Suenaga Constraining Logits by Bounded Function for Adversarial Robustness.Sekitoshi Kanai; Masanori Yamada; Shin'ya Yamaguchi; Hiroshi Takahashi; Yasutoshi Ida Adversarial Patch Attacks on Monocular Depth Estimation Networks.Koichiro Yamanaka; Ryutaroh Matsumoto; Keita Takahashi; Toshiaki Fujii BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models.Ahmed Salem; Yannick Sautter; Michael Backes; Mathias Humbert; Yang Zhang 2020-10-05 Detecting Misclassification Errors in Neural Networks with a Gaussian Process Model.Xin Qiu; Risto Miikkulainen Adversarial Boot Camp: label free certified robustness in one epoch.Ryan Campbell; Chris Finlay; Adam M Oberman Understanding Classifier Mistakes with Generative Models.Laëtitia Shao; Yang Song; Stefano Ermon CAT-Gen: Improving Robustness in NLP Models via Controlled Adversarial Text Generation.Tianlu Wang; Xuezhi Wang; Yao Qin; Ben Packer; Kang Li; Jilin Chen; Alex Beutel; Ed Chi Second-Order NLP Adversarial Examples.John X. Morris A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Inference.Sanghyun Hong; Yiğitcan Kaya; Ionuţ-Vlad Modoranu; Tudor Dumitraş InfoBERT: Improving Robustness of Language Models from An Information Theoretic Perspective.Boxin Wang; Shuohang Wang; Yu Cheng; Zhe Gan; Ruoxi Jia; Bo Li; Jingjing Liu Understanding Catastrophic Overfitting in Single-step Adversarial Training.Hoki Kim; Woojin Lee; Jaewook Lee Downscaling Attack and Defense: Turning What You See Back Into What You Get.Andrew J. Lohn 2020-10-04 Unknown Presentation Attack Detection against Rational Attackers.Ali Khodabakhsh Geometry-aware Instance-reweighted Adversarial Training.Jingfeng Zhang; Jianing Zhu; Gang Niu; Bo Han; Masashi Sugiyama; Mohan Kankanhalli TextAttack: Lessons learned in designing Python frameworks for NLP.John X. Morris; Jin Yong Yoo; Yanjun Qi A Study for Universal Adversarial Attacks on Texture Recognition.Yingpeng Deng; Lina J. Karam Adversarial Attack and Defense of Structured Prediction Models.Wenjuan Han; Liwen Zhang; Yong Jiang; Kewei Tu 2020-10-03 Adversarial and Natural Perturbations for General Robustness.Sadaf Gulshad; Jan Hendrik Metzen; Arnold Smeulders Multi-Step Adversarial Perturbations on Recommender Systems Embeddings.Vito Walter Anelli; Alejandro Bellogín; Yashar Deldjoo; Noia Tommaso Di; Felice Antonio Merra A Geometry-Inspired Attack for Generating Natural Language Adversarial Examples.Zhao Meng; Roger Wattenhofer Does Network Width Really Help Adversarial Robustness?Boxi Wu; Jinghui Chen; Deng Cai; Xiaofei He; Quanquan Gu Efficient Robust Training via Backward Smoothing.Jinghui Chen; Yu Cheng; Zhe Gan; Quanquan Gu; Jingjing Liu 2020-10-02 Note: An alternative proof of the vulnerability of $k$-NN classifiers in high intrinsic dimensionality regions.Teddy Furon An Empirical Study of DNNs Robustification Inefficacy in Protecting Visual Recommenders.Vito Walter Anelli; Noia Tommaso Di; Daniele Malitesta; Felice Antonio Merra Block-wise Image Transformation with Secret Key for Adversarially Robust Defense.MaungMaung AprilPyone; Hitoshi Kiya Query complexity of adversarial attacks.Grzegorz Głuch; Rüdiger Urbanke CorrAttack: Black-box Adversarial Attack with Structured Search.Zhichao Huang; Yaowei Huang; Tong Zhang A Deep Genetic Programming based Methodology for Art Media Classification Robust to Adversarial Perturbations.Gustavo Olague; Gerardo Ibarra-Vazquez; Mariana Chan-Ley; Cesar Puente; Carlos Soubervielle-Montalvo; Axel Martinez 2020-10-01 Assessing Robustness of Text Classification through Maximal Safe Radius Computation.Malfa Emanuele La; Min Wu; Luca Laurenti; Benjie Wang; Anthony Hartshorn; Marta Kwiatkowska Bag of Tricks for Adversarial Training.Tianyu Pang; Xiao Yang; Yinpeng Dong; Hang Su; Jun Zhu 2020-09-30 Erratum Concerning the Obfuscated Gradients Attack on Stochastic Activation Pruning.Guneet S. Dhillon; Nicholas Carlini Accurate and Robust Feature Importance Estimation under Distribution Shifts.Jayaraman J. Thiagarajan; Vivek Narayanaswamy; Rushil Anirudh; Peer-Timo Bremer; Andreas Spanias Uncertainty-Matching Graph Neural Networks to Defend Against Poisoning Attacks.Uday Shankar Shanthamallu; Jayaraman J. Thiagarajan; Andreas Spanias DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles.Huanrui Yang; Jingyang Zhang; Hongliang Dong; Nathan Inkawhich; Andrew Gardner; Andrew Touchet; Wesley Wilkes; Heath Berry; Hai Li 2020-09-29 Neural Topic Modeling with Cycle-Consistent Adversarial Training.Xuemeng Hu; Rui Wang; Deyu Zhou; Yuxuan Xiong Fast Fr\'echet Inception Distance.Alexander Mathiasen; Frederik Hvilshøj 2020-09-28 Adversarial Robustness of Stabilized NeuralODEs Might be from Obfuscated Gradients.Yifei Huang; Yaodong Yu; Hongyang Zhang; Yi Ma; Yuan Yao Generating End-to-End Adversarial Examples for Malware Classifiers Using Explainability.Ishai Omid Rosenberg; Shai Omid Meir; Jonathan Omid Berrebi; Ilay Omid Gordon; Guillaume Omid Sicard; Omid Eli; David Adversarial Attacks Against Deep Learning Systems for ICD-9 Code Assignment.Sharan Raja; Rudraksh Tuwani STRATA: Building Robustness with a Simple Method for Generating Black-box Adversarial Attacks for Models of Code.Jacob M. Springer; Bryn Marie Reinstadler; Una-May O'Reilly Graph Adversarial Networks: Protecting Information against Adversarial Attacks.Peiyuan Liao; Han Zhao; Keyulu Xu; Tommi Jaakkola; Geoffrey Gordon; Stefanie Jegelka; Ruslan Salakhutdinov 2020-09-27 Learning to Improve Image Compression without Changing the Standard Decoder.Yannick Strümpler; Ren Yang; Radu Timofte RoGAT: a robust GNN combined revised GAT with adjusted graphs.Xianchen Zhou; Yaoyun Zeng; Hongxia Wang Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence.Chang Liao; Yao Cheng; Chengfang Fang; Jie Shi 2020-09-26 Differentially Private Adversarial Robustness Through Randomized Perturbations.Nan Xu; Oluwaseyi Feyisetan; Abhinav Aggarwal; Zekun Xu; Nathanael Teissier Beneficial Perturbations Network for Defending Adversarial Examples.Shixian Wen; Amanda Rios; Laurent Itti 2020-09-25 Training CNNs in Presence of JPEG Compression: Multimedia Forensics vs Computer Vision.Sara Mandelli; Nicolò Bonettini; Paolo Bestagini; Stefano Tubaro Attention Meets Perturbations: Robust and Interpretable Attention with Adversarial Training.Shunsuke Kitada; Hitoshi Iyatomi 2020-09-24 Advancing the Research and Development of Assured Artificial Intelligence and Machine Learning Capabilities.Tyler J. Shipp; Daniel J. Clouse; Lucia Michael J. De; Metin B. Ahiskali; Kai Steverson; Jonathan M. Mullin; Nathaniel D. Bastian Adversarial Examples in Deep Learning for Multivariate Time Series Regression.Gautam Raj Mode; Khaza Anuarul Hoque Improving Query Efficiency of Black-box Adversarial Attack.Yang Bai; Yuyuan Zeng; Yong Jiang; Yisen Wang; Shu-Tao Xia; Weiwei Guo 2020-09-23 Enhancing Mixup-based Semi-Supervised Learning with Explicit Lipschitz Regularization.Prashnna Kumar Gyawali; Sandesh Ghimire; Linwei Wang Improving Dialog Evaluation with a Multi-reference Adversarial Dataset and Large Scale Pretraining.Ananya B. Sai; Akash Kumar Mohankumar; Siddhartha Arora; Mitesh M. Khapra Adversarial robustness via stochastic regularization of neural activation sensitivity.Gil Fidel; Ron Bitton; Ziv Katzir; Asaf Shabtai A Partial Break of the Honeypots Defense to Catch Adversarial Attacks.Nicholas Carlini Semantics-Preserving Adversarial Training.Wonseok Lee; Hanbit Lee; Sang-goo Lee Robustification of Segmentation Models Against Adversarial Perturbations In Medical Imaging.Hanwool Park; Amirhossein Bayat; Mohammad Sabokrou; Jan S. Kirschke; Bjoern H. Menze Detection of Iterative Adversarial Attacks via Counter Attack.Matthias Rottmann; Kira Maag; Mathis Peyron; Natasa Krejic; Hanno Gottschalk Torchattacks: A PyTorch Repository for Adversarial Attacks.Hoki Kim 2020-09-22 What Do You See? Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors.Yi-Shan Lin; Wen-Chuan Lee; Z. Berkay Celik Tailoring: encoding inductive biases by optimizing unsupervised objectives at prediction time.Ferran Alet; Kenji Kawaguchi; Tomas Lozano-Perez; Leslie Pack Kaelbling Adversarial Attack Based Countermeasures against Deep Learning Side-Channel Attacks.Ruizhe Gu; Ping Wang; Mengce Zheng; Honggang Hu; Nenghai Yu 2020-09-21 Uncertainty-aware Attention Graph Neural Network for Defending Adversarial Attacks.Boyuan Feng; Yuke Wang; Zheng Wang; Yufei Ding Optimal Provable Robustness of Quantum Classification via Quantum Hypothesis Testing.Maurice Weber; Nana Liu; Bo Li; Ce Zhang; Zhikuan Zhao Scalable Adversarial Attack on Graph Neural Networks with Alternating Direction Method of Multipliers.Boyuan Feng; Yuke Wang; Xu Li; Yufei Ding Generating Adversarial yet Inconspicuous Patches with a Single Image.Jinqi Luo; Tao Bai; Jun Zhao; Bo Li Adversarial Training with Stochastic Weight Average.Joong-Won Hwang; Youngwan Lee; Sungchan Oh; Yuseok Bae Improving Ensemble Robustness by Collaboratively Promoting and Demoting Adversarial Robustness.Anh Bui; Trung Le; He Zhao; Paul Montague; Olivier deVel; Tamas Abraham; Dinh Phung DeepDyve: Dynamic Verification for Deep Neural Networks.Yu Li; Min Li; Bo Luo; Ye Tian; Qiang Xu Feature Distillation With Guided Adversarial Contrastive Learning.Tao Bai; Jinnan Chen; Jun Zhao; Bihan Wen; Xudong Jiang; Alex Kot Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version).Gautam Raj Mode; Khaza Anuarul Hoque Stereopagnosia: Fooling Stereo Networks with Adversarial Perturbations.Alex Wong; Mukund Mundhra; Stefano Soatto Information Signaling: A Counter-Intuitive Defense Against Password Cracking. (1%)Wenjie Bai; Jeremiah Blocki; Ben Harsha 2020-09-20 Improving Robustness and Generality of NLP Models Using Disentangled Representations.Jiawei Wu; Xiaoya Li; Xiang Ao; Yuxian Meng; Fei Wu; Jiwei Li 2020-09-19 Efficient Certification of Spatial Robustness.Anian Ruoss; Maximilian Baader; Mislav Balunović; Martin Vechev OpenAttack: An Open-source Textual Adversarial Attack Toolkit.Guoyang Zeng; Fanchao Qi; Qianrui Zhou; Tingji Zhang; Bairu Hou; Yuan Zang; Zhiyuan Liu; Maosong Sun It's Raining Cats or Dogs? Adversarial Rain Attack on DNN Perception.Liming Zhai; Felix Juefei-Xu; Qing Guo; Xiaofei Xie; Lei Ma; Wei Feng; Shengchao Qin; Yang Liu Making Images Undiscoverable from Co-Saliency Detection.Ruijun Gao; Qing Guo; Felix Juefei-Xu; Hongkai Yu; Xuhong Ren; Wei Feng; Song Wang Adversarial Exposure Attack on Diabetic Retinopathy Imagery.Yupeng Cheng; Felix Juefei-Xu; Qing Guo; Huazhu Fu; Xiaofei Xie; Shang-Wei Lin; Weisi Lin; Yang Liu Bias Field Poses a Threat to DNN-based X-Ray Recognition.Binyu Tian; Qing Guo; Felix Juefei-Xu; Wen Le Chan; Yupeng Cheng; Xiaohong Li; Xiaofei Xie; Shengchao Qin Learning to Attack: Towards Textual Adversarial Attacking in Real-world Situations.Yuan Zang; Bairu Hou; Fanchao Qi; Zhiyuan Liu; Xiaojun Meng; Maosong Sun EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial Attacks.Yaguan Qian; Qiqi Shao; Jiamin Wang; Xiang Lin; Yankai Guo; Zhaoquan Gu; Bin Wang; Chunming Wu 2020-09-18 Robust Decentralized Learning for Neural Networks.Yao Zhou; Jun Wu; Jingrui He MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design. (1%)Gururaj Saileshwar; Moinuddin Qureshi 2020-09-17 Certifying Confidence via Randomized Smoothing.Aounon Kumar; Alexander Levine; Soheil Feizi; Tom Goldstein Generating Label Cohesive and Well-Formed Adversarial Claims.Pepa Atanasova; Dustin Wright; Isabelle Augenstein Vax-a-Net: Training-time Defence Against Adversarial Patch Attacks.T. Gittings; S. Schneider; J. Collomosse Label Smoothing and Adversarial Robustness.Chaohao Fu; Hongbin Chen; Na Ruan; Weijia Jia MultAV: Multiplicative Adversarial Videos.Shao-Yuan Lo; Vishal M. Patel Online Alternate Generator against Adversarial Attacks.Haofeng Li; Yirui Zeng; Guanbin Li; Liang Lin; Yizhou Yu On the Transferability of Minimal Prediction Preserving Inputs in Question Answering.Shayne Longpre; Yi Lu; Christopher DuBois Large Norms of CNN Layers Do Not Hurt Adversarial Robustness.Youwei Liang; Dong Huang 2020-09-16 Multimodal Safety-Critical Scenarios Generation for Decision-Making Algorithms Evaluation.Wenhao Ding; Baiming Chen; Bo Li; Kim Ji Eun; Ding Zhao Analysis of Generalizability of Deep Neural Networks Based on the Complexity of Decision Boundary.Shuyue Guan; Murray Loew Malicious Network Traffic Detection via Deep Learning: An Information Theoretic View.Erick Galinkin Contextualized Perturbation for Textual Adversarial Attack.Dianqi Li; Yizhe Zhang; Hao Peng; Liqun Chen; Chris Brockett; Ming-Ting Sun; Bill Dolan 2020-09-15 Puzzle Mix: Exploiting Saliency and Local Statistics for Optimal Mixup.Jang-Hyun Kim; Wonho Choo; Hyun Oh Song Light Can Hack Your Face! Black-box Backdoor Attack on Face Recognition Systems.Haoliang Nanyang Technological University, Singapore Li; Yufei Nanyang Technological University, Singapore Wang; Xiaofei Nanyang Technological University, Singapore Xie; Yang Nanyang Technological University, Singapore Liu; Shiqi City University of Hong Kong Wang; Renjie Nanyang Technological University, Singapore Wan; Lap-Pui Nanyang Technological University, Singapore Chau; Alex C. Nanyang Technological University, Singapore Kot Switching Gradient Directions for Query-Efficient Black-Box Adversarial Attacks.Chen Ma; Shuyu Cheng; Li Chen; Junhai Yong Decision-based Universal Adversarial Attack.Jing Wu; Mingyi Zhou; Shuaicheng Liu; Yipeng Liu; Ce Zhu 2020-09-14 A Game Theoretic Analysis of Additive Adversarial Attacks and Defenses.Ambar Pal; René Vidal Input Hessian Regularization of Neural Networks.Waleed Mustafa; Robert A. Vandermeulen; Marius Kloft Robust Deep Learning Ensemble against Deception.Wenqi Wei; Ling Liu Hold Tight and Never Let Go: Security of Deep Learning based Automated Lane Centering under Physical-World Attack.Takami Sato; Junjie Shen; Ningfei Wang; Yunhan Jack Jia; Xue Lin; Qi Alfred Chen 2020-09-13 Manifold attack.Khanh-Hung Tran; Fred-Maurice Ngole-Mboula; Jean-Luc Starck Towards the Quantification of Safety Risks in Deep Neural Networks.Peipei Xu; Wenjie Ruan; Xiaowei Huang 2020-09-12 Certified Robustness of Graph Classification against Topology Attack with Randomized Smoothing.Zhidong Gao; Rui Hu; Yanmin Gong 2020-09-11 Achieving Adversarial Robustness via Sparsity.Shufan Wang; Ningyi Liao; Liyao Xiang; Nanyang Ye; Quanshi Zhang Counterfactual Explanations & Adversarial Examples -- Common Grounds, Essential Differences, and Potential Transfers.Timo Freiesleben Defending Against Multiple and Unforeseen Adversarial Videos.Shao-Yuan Lo; Vishal M. Patel Robust Neural Machine Translation: Modeling Orthographic and Interpunctual Variation.Toms Bergmanis; Artūrs Stafanovičs; Mārcis Pinnis Semantic-preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection.Lan Zhang; Peng Liu; Yoon-Ho Choi 2020-09-10 Second Order Optimization for Adversarial Robustness and Interpretability.Theodoros Tsiligkaridis; Jay Roberts Quantifying the Preferential Direction of the Model Gradient in Adversarial Training With Projected Gradient Descent.Ricardo Bigolin Lanfredi; Joyce D. Schroeder; Tolga Tasdizen 2020-09-09 A Black-box Adversarial Attack for Poisoning Clustering.Antonio Emanuele Cinà; Alessandro Torcinovich; Marcello Pelillo End-to-end Kernel Learning via Generative Random Fourier Features.Kun Fang; Xiaolin Huang; Fanghui Liu; Jie Yang SoK: Certified Robustness for Deep Neural Networks.Linyi Li; Xiangyu Qi; Tao Xie; Bo Li Searching for a Search Method: Benchmarking Search Algorithms for Generating NLP Adversarial Examples.Jin Yong Yoo; John X. Morris; Eli Lifland; Yanjun Qi 2020-09-08 Fuzzy Unique Image Transformation: Defense Against Adversarial Attacks On Deep COVID-19 Models.Achyut Mani Tripathi; Ashish Mishra Adversarial Machine Learning in Image Classification: A Survey Towards the Defender's Perspective.Gabriel Resende Machado; Eugênio Silva; Ronaldo Ribeiro Goldschmidt 2020-09-07 Adversarial attacks on deep learning models for fatty liver disease classification by modification of ultrasound image reconstruction method.Michal Byra; Grzegorz Styczynski; Cezary Szmigielski; Piotr Kalinowski; Lukasz Michalowski; Rafal Paluszkiewicz; Bogna Ziarkiewicz-Wroblewska; Krzysztof Zieniewicz; Andrzej Nowicki Adversarial Attack on Large Scale Graph.Jintang Li; Tao Xie; Liang Chen; Fenfang Xie; Xiangnan He; Zibin Zheng Black Box to White Box: Discover Model Characteristics Based on Strategic Probing.Josh Kalin; Matthew Ciolino; David Noever; Gerry Dozier 2020-09-06 A Game Theoretic Analysis of LQG Control under Adversarial Attack.Zuxing Li; György Dán; Dong Liu Dynamically Computing Adversarial Perturbations for Recurrent Neural Networks.Shankar A. Deka; Dušan M. Stipanović; Claire J. Tomlin Detection Defense Against Adversarial Attacks with Saliency Map.Dengpan Ye; Chuanxi Chen; Changrui Liu; Hao Wang; Shunzhi Jiang 2020-09-05 Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks.Nilaksh Polo Das; Haekyu Polo Park; Zijie J. Polo Wang; Fred Polo Hohman; Robert Polo Firstman; Emily Polo Rogers; Duen Polo Horng; Chau Dual Manifold Adversarial Robustness: Defense against Lp and non-Lp Adversarial Attacks.Wei-An Lin; Chun Pong Lau; Alexander Levine; Rama Chellappa; Soheil Feizi 2020-09-03 MIPGAN -- Generating Strong and High Quality Morphing Attacks Using Identity Prior Driven GAN. (10%)Haoyu Zhang; Sushma Venkatesh; Raghavendra Ramachandra; Kiran Raja; Naser Damer; Christoph Busch 2020-09-02 Yet Meta Learning Can Adapt Fast, It Can Also Break Easily.Han Xu; Yaxin Li; Xiaorui Liu; Hui Liu; Jiliang Tang Perceptual Deep Neural Networks: Adversarial Robustness through Input Recreation.Danilo Vasconcellos Vargas; Bingli Liao; Takahiro Kanzaki Open-set Adversarial Defense.Rui Shao; Pramuditha Perera; Pong C. Yuen; Vishal M. Patel Adversarially Robust Neural Architectures.Minjing Dong; Yanxi Li; Yunhe Wang; Chang Xu Flow-based detection and proxy-based evasion of encrypted malware C2 traffic.Carlos University of Porto and INESC TEC Novo; Ricardo University of Porto and INESC TEC Morla Adversarial Attacks on Deep Learning Systems for User Identification based on Motion Sensors.Cezara Benegui; Radu Tudor Ionescu Simulating Unknown Target Models for Query-Efficient Black-box Attacks.Chen Ma; Li Chen; Jun-Hai Yong 2020-09-01 Defending against substitute model black box adversarial attacks with the 01 loss.Yunzhe Xue; Meiyan Xie; Usman Roshan 2020-08-31 Adversarial Patch Camouflage against Aerial Detection.Ajaya Adhikari; Richard den Hollander; Ioannis Tolios; Bekkum Michael van; Anneloes Bal; Stijn Hendriks; Maarten Kruithof; Dennis Gross; Nils Jansen; Guillermo Pérez; Kit Buurman; Stephan Raaijmakers Evasion Attacks to Graph Neural Networks via Influence Function.Binghui Wang; Tianxiang Zhou; Minhua Lin; Pan Zhou; Ang Li; Meng Pang; Cai Fu; Hai Li; Yiran Chen MALCOM: Generating Malicious Comments to Attack Neural Fake News Detection Models.Thai Le; Suhang Wang; Dongwon Lee 2020-08-30 An Integrated Approach to Produce Robust Models with High Efficiency.Zhijian Li; Bao Wang; Jack Xin Benchmarking adversarial attacks and defenses for time-series data.Shoaib Ahmed Siddiqui; Andreas Dengel; Sheraz Ahmed Shape Defense.Ali Borji 2020-08-29 Improving Resistance to Adversarial Deformations by Regularizing Gradients.Pengfei Xia; Bin Li 2020-08-27 A Scene-Agnostic Framework with Adversarial Training for Abnormal Event Detection in Video.Mariana-Iuliana Georgescu; Radu Tudor Ionescu; Fahad Shahbaz Khan; Marius Popescu; Mubarak Shah GhostBuster: Looking Into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing.Zhongyuan Hau; Soteris Demetriou; Luis Muñoz-González; Emil C. Lupu Minimal Adversarial Examples for Deep Learning on 3D Point Clouds.Jaeyeon Kim; Binh-Son Hua; Duc Thanh Nguyen; Sai-Kit Yeung On the Intrinsic Robustness of NVM Crossbars Against Adversarial Attacks.Deboleena Roy; Indranil Chakraborty; Timur Ibrayev; Kaushik Roy Adversarial Eigen Attack on Black-Box Models.Linjun Zhou; Peng Cui; Yinan Jiang; Shiqiang Yang Color and Edge-Aware Adversarial Image Perturbations.Robert Bassett; Mitchell Graves; Patrick Reilly Adversarially Robust Learning via Entropic Regularization.Gauri Jagatap; Ameya Joshi; Animesh Basak Chowdhury; Siddharth Garg; Chinmay Hegde 2020-08-26 Adversarially Training for Audio Classifiers.Raymel Alfonso Sallo; Mohammad Esmaeilpour; Patrick Cardinal 2020-08-25 Rethinking Non-idealities in Memristive Crossbars for Adversarial Robustness in Neural Networks.Abhiroop Bhattacharjee; Priyadarshini Panda Likelihood Landscapes: A Unifying Principle Behind Many Adversarial Defenses.Fu Lin; Rohit Mittapalli; Prithvijit Chattopadhyay; Daniel Bolya; Judy Hoffman Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning.Yinghua Zhang; Yangqiu Song; Jian Liang; Kun Bai; Qiang Yang An Adversarial Attack Defending System for Securing In-Vehicle Networks.Yi Li; Jing Lin; Kaiqi Xiong 2020-08-24 Certified Robustness of Graph Neural Networks against Adversarial Structural Perturbation.Binghui Wang; Jinyuan Jia; Xiaoyu Cao; Neil Zhenqiang Gong 2020-08-23 Developing and Defeating Adversarial Examples.Ian McDiarmid-Sterling; Allan Moser Ptolemy: Architecture Support for Robust Deep Learning.Yiming Gan; Yuxian Qiu; Jingwen Leng; Minyi Guo; Yuhao Zhu PermuteAttack: Counterfactual Explanation of Machine Learning Credit Scorecards.Masoud Hashemi; Ali Fathi 2020-08-22 Self-Competitive Neural Networks.Iman Saberi; Fathiyeh Faghih 2020-08-21 A Survey on Assessing the Generalization Envelope of Deep Neural Networks at Inference Time for Image Classification.Julia Lust; Alexandru Paul Condurache 2020-08-20 Towards adversarial robustness with 01 loss neural networks.Yunzhe Xue; Meiyan Xie; Usman Roshan On Attribution of Deepfakes.Baiwu Zhang; Jin Peng Zhou; Ilia Shumailov; Nicolas Papernot $\beta$-Variational Classifiers Under Attack.Marco Maggipinto; Matteo Terzi; Gian Antonio Susto Yet Another Intermediate-Level Attack.Qizhang Li; Yiwen Guo; Hao Chen 2020-08-19 Prototype-based interpretation of the functionality of neurons in winner-take-all neural networks.Ramin Zarei Sabzevar; Kamaledin Ghiasi-Shirazi; Ahad Harati Addressing Neural Network Robustness with Mixup and Targeted Labeling Adversarial Training.Alfred Laugros; Alice Caplier; Matthieu Ospici On $\ell_p$-norm Robustness of Ensemble Stumps and Trees.Yihan Wang; Huan Zhang; Hongge Chen; Duane Boning; Cho-Jui Hsieh 2020-08-18 Improving adversarial robustness of deep neural networks by using semantic information.Lina Wang; Rui Tang; Yawei Yue; Xingshu Chen; Wei Wang; Yi Zhu; Xuemei Zeng Direct Adversarial Training for GANs.Ziqiang Li Accelerated Zeroth-Order and First-Order Momentum Methods from Mini to Minimax Optimization.Feihu Huang; Shangqian Gao; Jian Pei; Heng Huang 2020-08-17 A Deep Dive into Adversarial Robustness in Zero-Shot Learning.Mehmet Kerim Yucel; Ramazan Gokberk Cinbis; Pinar Duygulu Adversarial Attack and Defense Strategies for Deep Speaker Recognition Systems.Arindam Jati; Chin-Cheng Hsu; Monisankha Pal; Raghuveer Peri; Wael AbdAlmageed; Shrikanth Narayanan Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection.Luca Demetrio; Scott E. Coull; Battista Biggio; Giovanni Lagorio; Alessandro Armando; Fabio Roli 2020-08-16 TextDecepter: Hard Label Black Box Attack on Text Classifiers.Sachin Saxena Adversarial Concurrent Training: Optimizing Robustness and Accuracy Trade-off of Deep Neural Networks.Elahe Arani; Fahad Sarfraz; Bahram Zonooz 2020-08-15 Relevance Attack on Detectors.Sizhe Chen; Fan He; Xiaolin Huang; Kun Zhang 2020-08-14 Efficiently Constructing Adversarial Examples by Feature Watermarking.Yuexin Xiang; Wei Ren; Tiantian Li; Xianghan Zheng; Tianqing Zhu; Kim-Kwang Raymond Choo Defending Adversarial Attacks without Adversarial Attacks in Deep Reinforcement Learning.Xinghua Qu; Yew-Soon Ong; Abhishek Gupta; Zhu Sun On the Generalization Properties of Adversarial Training.Yue Xing; Qifan Song; Guang Cheng 2020-08-13 Adversarial Training and Provable Robustness: A Tale of Two Objectives.Jiameng Fan; Wenchao Li Semantically Adversarial Learnable Filters.Ali Shahin Shamsabadi; Changjae Oh; Andrea Cavallaro 2020-08-12 Learning to Learn from Mistakes: Robust Optimization for Adversarial Noise.Alex Serban; Erik Poll; Joost Visser Defending Adversarial Examples via DNN Bottleneck Reinforcement.Wenqing Liu; Miaojing Shi; Teddy Furon; Li Li Feature Binding with Category-Dependant MixUp for Semantic Segmentation and Adversarial Robustness.Md Amirul Islam; Matthew Kowal; Konstantinos G. Derpanis; Neil D. B. Bruce Semantics-preserving adversarial attacks in NLP.Rahul Singh; Tarun Joshi; Vijayan N. Nair; Agus Sudjianto 2020-08-11 Revisiting Adversarially Learned Injection Attacks Against Recommender Systems.Jiaxi Tang; Hongyi Wen; Ke Wang 2020-08-10 Informative Dropout for Robust Representation Learning: A Shape-bias Perspective.Baifeng Shi; Dinghuai Zhang; Qi Dai; Zhanxing Zhu; Yadong Mu; Jingdong Wang FireBERT: Hardening BERT-based classifiers against adversarial attack.Gunnar Mein; Kevin Hartman; Andrew Morris 2020-08-09 Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems.Mohammad J. Hashemi; Eric Keller Adversarial Training with Fast Gradient Projection Method against Synonym Substitution based Text Attacks.Xiaosen Wang; Yichen Yang; Yihe Deng; Kun He 2020-08-08 Enhance CNN Robustness Against Noises for Classification of 12-Lead ECG with Variable Length.Linhai Ma; Liang Liang 2020-08-07 Visual Attack and Defense on Text.Shengjun Liu; Ningkang Jiang; Yuanbin Wu Optimizing Information Loss Towards Robust Neural Networks.Philip Sperl; Konstantin Böttinger Adversarial Examples on Object Recognition: A Comprehensive Survey.Alex Serban; Erik Poll; Joost Visser 2020-08-06 Improve Generalization and Robustness of Neural Networks via Weight Scale Shifting Invariant Regularizations.Ziquan Liu; Yufei Cui; Antoni B. Chan Stronger and Faster Wasserstein Adversarial Attacks.Kaiwen Wu; Allen Houze Wang; Yaoliang Yu 2020-08-05 One word at a time: adversarial attacks on retrieval models.Nisarg Raval; Manisha Verma Robust Deep Reinforcement Learning through Adversarial Loss.Tuomas Oikarinen; Tsui-Wei Weng; Luca Daniel 2020-08-04 Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples.Xiaojun Jia; Xingxing Wei; Xiaochun Cao; Xiaoguang Han TREND: Transferability based Robust ENsemble Design.Deepak Ravikumar; Sangamesh Kodge; Isha Garg; Kaushik Roy Can Adversarial Weight Perturbations Inject Neural Backdoors?Siddhant Garg; Adarsh Kumar; Vibhor Goel; Yingyu Liang Entropy Guided Adversarial Model for Weakly Supervised Object Localization.Sabrina Narimene Benassou; Wuzhen Shi; Feng Jiang 2020-08-03 Hardware Accelerator for Adversarial Attacks on Deep Learning Neural Networks.Haoqiang Guo; Lu Peng; Jian Zhang; Fang Qi; Lide Duan Anti-Bandit Neural Architecture Search for Model Defense.Hanlin Chen; Baochang Zhang; Song Xue; Xuan Gong; Hong Liu; Rongrong Ji; David Doermann 2020-08-01 Efficient Adversarial Attacks for Visual Object Tracking.Siyuan Liang; Xingxing Wei; Siyuan Yao; Xiaochun Cao Trojaning Language Models for Fun and Profit.Xinyang Zhang; Zheng Zhang; Shouling Ji; Ting Wang 2020-07-31 Vulnerability Under Adversarial Machine Learning: Bias or Variance?Hossein Aboutalebi; Mohammad Javad Shafiee; Michelle Karg; Christian Scharfenberger; Alexander Wong Physical Adversarial Attack on Vehicle Detector in the Carla Simulator.Tong Wu; Xuefei Ning; Wenshuo Li; Ranran Huang; Huazhong Yang; Yu Wang Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers.Brian Kim; Yalin E. Sagduyu; Tugba Erpek; Kemal Davaslioglu; Sennur Ulukus TEAM: We Need More Powerful Adversarial Examples for DNNs.Yaguan Qian; Ximin Zhang; Bin Wang; Wei Li; Zhaoquan Gu; Haijiang Wang; Wassim Swaileh 2020-07-30 Black-box Adversarial Sample Generation Based on Differential Evolution.Junyu Lin; Lei Xu; Yingqi Liu; Xiangyu Zhang A Data Augmentation-based Defense Method Against Adversarial Attacks in Neural Networks.Yi Zeng; Han Qiu; Gerard Memmi; Meikang Qiu 2020-07-29 End-to-End Adversarial White Box Attacks on Music Instrument Classification.Katharina Johannes Kepler University Linz Prinz; Arthur Johannes Kepler University Linz Flexer Adversarial Robustness for Machine Learning Cyber Defenses Using Log Data.Kai Steverson; Jonathan Mullin; Metin Ahiskali Stylized Adversarial Defense.Muzammal Naseer; Salman Khan; Munawar Hayat; Fahad Shahbaz Khan; Fatih Porikli Generative Classifiers as a Basis for Trustworthy Computer Vision.Radek Mackowiak; Lynton Ardizzone; Ullrich Köthe; Carsten Rother Detecting Anomalous Inputs to DNN Classifiers By Joint Statistical Testing at the Layers.Jayaram Raghuram; Varun Chandrasekaran; Somesh Jha; Suman Banerjee 2020-07-28 Cassandra: Detecting Trojaned Networks from Adversarial Perturbations.Xiaoyu Zhang; Ajmal Mian; Rohit Gupta; Nazanin Rahnavard; Mubarak Shah Reachable Sets of Classifiers & Regression Models: (Non-)Robustness Analysis and Robust Training.Anna-Kathrin Kopetzki; Stephan Günnemann Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning.Jirong Yi; Raghu Mudumbai; Weiyu Xu Label-Only Membership Inference Attacks.Christopher A. Choquette-Choo; Florian Tramer; Nicholas Carlini; Nicolas Papernot 2020-07-27 Attacking and Defending Machine Learning Applications of Public Cloud.Dou Goodman; Hao Xin KOVIS: Keypoint-based Visual Servoing with Zero-Shot Sim-to-Real Transfer for Robotics Manipulation.En Yen Puang; Keng Peng Tee; Wei Jing From Sound Representation to Model Robustness.Mohamad Esmaeilpour; Patrick Cardinal; Alessandro Lameiras Koerich Towards Accuracy-Fairness Paradox: Adversarial Example-based Data Augmentation for Visual Debiasing.Yi Zhang; Jitao Sang 2020-07-26 RANDOM MASK: Towards Robust Convolutional Neural Networks.Tiange Luo; Tianle Cai; Mengxiao Zhang; Siyu Chen; Liwei Wang Robust Collective Classification against Structural Attacks.Kai Zhou; Yevgeniy Vorobeychik 2020-07-25 MirrorNet: Bio-Inspired Adversarial Attack for Camouflaged Object Segmentation.Jinnan Yan; Trung-Nghia Le; Khanh-Duy Nguyen; Minh-Triet Tran; Thanh-Toan Do; Tam V. Nguyen Adversarial Privacy-preserving Filter.Jiaming Zhang; Jitao Sang; Xian Zhao; Xiaowen Huang; Yanfeng Sun; Yongli Hu MP3 Compression To Diminish Adversarial Noise in End-to-End Speech Recognition.Iustina Andronic; Ludwig Kürzinger; Edgar Ricardo Chavez Rosas; Gerhard Rigoll; Bernhard U. Seeber 2020-07-23 Scalable Inference of Symbolic Adversarial Examples.Dimitar I. Dimitrov; Gagandeep Singh; Timon Gehr; Martin Vechev 2020-07-22 SOCRATES: Towards a Unified Platform for Neural Network Verification.Long H. Pham; Jiaying Li; Jun Sun Adversarial Training Reduces Information and Improves Transferability.Matteo Terzi; Alessandro Achille; Marco Maggipinto; Gian Antonio Susto Robust Machine Learning via Privacy/Rate-Distortion Theory.Ye Wang; Shuchin Aeron; Adnan Siraj Rakin; Toshiaki Koike-Akino; Pierre Moulin Threat of Adversarial Attacks on Face Recognition: A Comprehensive Survey.Fatemeh Vakhshiteh; Raghavendra Ramachandra; Ahmad Nickabadi 2020-07-21 Audio Adversarial Examples for Robust Hybrid CTC/Attention Speech Recognition.Ludwig Kürzinger; Edgar Ricardo Chavez Rosas; Lujun Li; Tobias Watzel; Gerhard Rigoll Towards Visual Distortion in Black-Box Attacks.Nannan Li; Zhenzhong Chen 2020-07-20 Neural Network Robustness Verification on GPUs.Christoph Müller; Gagandeep Singh; Markus Püschel; Martin Vechev DeepNNK: Explaining deep models and their generalization using polytope interpolation.Sarath Shekkizhar; Antonio Ortega AdvFoolGen: Creating Persistent Troubles for Deep Classifiers.Yuzhen Ding; Nupur Thakur; Baoxin Li Evaluating a Simple Retraining Strategy as a Defense Against Adversarial Attacks.Nupur Thakur; Yuzhen Ding; Baoxin Li Robust Tracking against Adversarial Attacks.Shuai Jia; Chao Ma; Yibing Song; Xiaokang Yang 2020-07-19 Semantic Equivalent Adversarial Data Augmentation for Visual Question Answering.Ruixue Tang; Chao Ma; Wei Emma Zhang; Qi Wu; Xiaokang Yang Exploiting vulnerabilities of deep neural networks for privacy protection.Ricardo Sanchez-Matilla; Chau Yi Li; Ali Shahin Shamsabadi; Riccardo Mazzon; Andrea Cavallaro Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency.Shasha Li; Shitong Zhu; Sudipta Paul; Amit Roy-Chowdhury; Chengyu Song; Srikanth Krishnamurthy; Ananthram Swami; Kevin S Chan Adversarial Immunization for Improving Certifiable Robustness on Graphs.Shuchang Tao; Huawei Shen; Qi Cao; Liang Hou; Xueqi Cheng 2020-07-18 DDR-ID: Dual Deep Reconstruction Networks Based Image Decomposition for Anomaly Detection.Dongyun Lin; Yiqun Li; Shudong Xie; Tin Lay Nwe; Sheng Dong 2020-07-17 Anomaly Detection in Unsupervised Surveillance Setting Using Ensemble of Multimodal Data with Adversarial Defense.Sayeed Shafayet Chowdhury; Kaji Mejbaul Islam; Rouhan Noor Neural Networks with Recurrent Generative Feedback.Yujia Huang; James Gornet; Sihui Dai; Zhiding Yu; Tan Nguyen; Doris Y. Tsao; Anima Anandkumar 2020-07-16 Understanding and Diagnosing Vulnerability under Adversarial Attacks.Haizhong Zheng; Ziqi Zhang; Honglak Lee; Atul Prakash Transfer Learning without Knowing: Reprogramming Black-box Machine Learning Models with Scarce Data and Limited Resources.Yun-Yun Tsai; Pin-Yu Chen; Tsung-Yi Ho Accelerated Stochastic Gradient-free and Projection-free Methods.Feihu Huang; Lue Tao; Songcan Chen Provable Worst Case Guarantees for the Detection of Out-of-Distribution Data.Julian Bitterwolf; Alexander Meinke; Matthias Hein An Empirical Study on the Robustness of NAS based Architectures.Chaitanya Devaguptapu; Devansh Agarwal; Gaurav Mittal; Vineeth N Balasubramanian Do Adversarially Robust ImageNet Models Transfer Better?Hadi Salman; Andrew Ilyas; Logan Engstrom; Ashish Kapoor; Aleksander Madry Learning perturbation sets for robust machine learning.Eric Wong; J. Zico Kolter On Robustness and Transferability of Convolutional Neural Networks. (1%)Josip Djolonga; Jessica Yung; Michael Tschannen; Rob Romijnders; Lucas Beyer; Alexander Kolesnikov; Joan Puigcerver; Matthias Minderer; Alexander D'Amour; Dan Moldovan; Sylvain Gelly; Neil Houlsby; Xiaohua Zhai; Mario Lucic 2020-07-15 A Survey of Privacy Attacks in Machine Learning.Maria Rigaki; Sebastian Garcia Accelerating Robustness Verification of Deep Neural Networks Guided by Target Labels.Wenjie Wan; Zhaodi Zhang; Yiwei Zhu; Min Zhang; Fu Song A Survey on Security Attacks and Defense Techniques for Connected and Autonomous Vehicles.Minh Pham; Kaiqi Xiong 2020-07-14 Towards robust sensing for Autonomous Vehicles: An adversarial perspective.Apostolos Modas; Ricardo Sanchez-Matilla; Pascal Frossard; Andrea Cavallaro Robustifying Reinforcement Learning Agents via Action Space Adversarial Training.Kai Liang Tan; Yasaman Esfandiari; Xian Yeow Lee; Aakanksha; Soumik Sarkar Bounding The Number of Linear Regions in Local Area for Neural Networks with ReLU Activations.Rui Zhu; Bo Lin; Haixu Tang Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack.Yupeng Cheng; Qing Guo; Felix Juefei-Xu; Xiaofei Xie; Shang-Wei Lin; Weisi Lin; Wei Feng; Yang Liu Multitask Learning Strengthens Adversarial Robustness.Chengzhi Mao; Amogh Gupta; Vikram Nitin; Baishakhi Ray; Shuran Song; Junfeng Yang; Carl Vondrick Adversarial Examples and Metrics.Nico Döttling; Kathrin Grosse; Michael Backes; Ian Molloy AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows.Hadi M. Dolatabadi; Sarah Erfani; Christopher Leckie Adversarial Attacks against Neural Networks in Audio Domain: Exploiting Principal Components.Ken Alparslan; Yigit Alparslan; Matthew Burlick Towards a Theoretical Understanding of the Robustness of Variational Autoencoders.Alexander Camuto; Matthew Willetts; Stephen Roberts; Chris Holmes; Tom Rainforth 2020-07-13 A simple defense against adversarial attacks on heatmap explanations.Laura Rieger; Lars Kai Hansen Understanding Adversarial Examples from the Mutual Influence of Images and Perturbations.Chaoning Zhang; Philipp Benz; Tooba Imtiaz; In-So Kweon Adversarial robustness via robust low rank representations.Pranjal Awasthi; Himanshu Jain; Ankit Singh Rawat; Aravindan Vijayaraghavan Security and Machine Learning in the Real World.Ivan Evtimov; Weidong Cui; Ece Kamar; Emre Kiciman; Tadayoshi Kohno; Jerry Li Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes.Satya Narayan Shukla; Anit Kumar Sahu; Devin Willmott; J. Zico Kolter Calling Out Bluff: Attacking the Robustness of Automatic Scoring Systems with Simple Adversarial Testing.Yaman Kumar; Mehar Bhatia; Anubha Kabra; Jessy Junyi Li; Di Jin; Rajiv Ratn Shah SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems.Hadi Abdullah; Kevin Warren; Vincent Bindschaedler; Nicolas Papernot; Patrick Traynor Patch-wise Attack for Fooling Deep Neural Network.Lianli Gao; Qilong Zhang; Jingkuan Song; Xianglong Liu; Heng Tao Shen 2020-07-12 Adversarial jamming attacks and defense strategies via adaptive deep reinforcement learning.Feng Wang; Chen Zhong; M. Cenk Gursoy; Senem Velipasalar Generating Fluent Adversarial Examples for Natural Languages.Huangzhao Zhang; Hao Zhou; Ning Miao; Lei Li Probabilistic Jacobian-based Saliency Maps Attacks.Théo Combey; António Loison; Maxime Faucher; Hatem Hajri 2020-07-11 Understanding Object Detection Through An Adversarial Lens.Ka-Ho Chow; Ling Liu; Mehmet Emre Gursoy; Stacey Truex; Wenqi Wei; Yanzhao Wu ManiGen: A Manifold Aided Black-box Generator of Adversarial Examples.Guanxiong Liu; Issa Khalil; Abdallah Khreishah; Abdulelah Algosaibi; Adel Aldalbahi; Mohammed Alaneem; Abdulaziz Alhumam; Mohammed Anan 2020-07-10 Improved Detection of Adversarial Images Using Deep Neural Networks.Yutong Gao; Yi Pan Miss the Point: Targeted Adversarial Attack on Multiple Landmark Detection.Qingsong Yao; Zecheng He; Hu Han; S. Kevin Zhou Generating Adversarial Inputs Using A Black-box Differential Technique.João Batista Pereira Matos Juúnior; Lucas Carvalho Cordeiro; Marcelo d'Amorim; Xiaowei Huang 2020-07-09 Improving Adversarial Robustness by Enforcing Local and Global Compactness.Anh Bui; Trung Le; He Zhao; Paul Montague; Olivier deVel; Tamas Abraham; Dinh Phung Boundary thickness and robustness in learning models.Yaoqing Yang; Rajiv Khanna; Yaodong Yu; Amir Gholami; Kurt Keutzer; Joseph E. Gonzalez; Kannan Ramchandran; Michael W. Mahoney Node Copying for Protection Against Graph Neural Network Topology Attacks.Florence Regol; Soumyasundar Pal; Mark Coates Efficient detection of adversarial images.Darpan Kumar Yadav; Kartik Mundra; Rahul Modpur; Arpan Chattopadhyay; Indra Narayan Kar 2020-07-08 How benign is benign overfitting?Amartya Sanyal; Puneet K Dokania; Varun Kanade; Philip H. S. Torr Delving into the Adversarial Robustness on Face Recognition.Xiao Yang; Dingcheng Yang; Yinpeng Dong; Wenjian Yu; Hang Su; Jun Zhu SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations.Giulio Lovisotto; Henry Turner; Ivo Sluganovic; Martin Strohmeier; Ivan Martinovic A Critical Evaluation of Open-World Machine Learning.Liwei Song; Vikash Sehwag; Arjun Nitin Bhagoji; Prateek Mittal On the relationship between class selectivity, dimensionality, and robustness.Matthew L. Leavitt; Ari S. Morcos Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs.Rana Abou Khamis; Ashraf Matrawy 2020-07-07 Robust Learning with Frequency Domain Regularization.Weiyu Guo; Yidong Ouyang Regional Image Perturbation Reduces $L_p$ Norms of Adversarial Examples While Maintaining Model-to-model Transferability.Utku Ozbulak; Jonathan Peck; Neve Wesley De; Bart Goossens; Yvan Saeys; Messem Arnout Van Fast Training of Deep Neural Networks Robust to Adversarial Perturbations.Justin Goodwin; Olivia Brown; Victoria Helus Making Adversarial Examples More Transferable and Indistinguishable.Junhua Zou; Zhisong Pan; Junyang Qiu; Yexin Duan; Xin Liu; Yu Pan Detection as Regression: Certified Object Detection by Median Smoothing.Ping-yeh Chiang; Michael J. Curry; Ahmed Abdelkader; Aounon Kumar; John Dickerson; Tom Goldstein 2020-07-06 Certifying Decision Trees Against Evasion Attacks by Program Analysis.Stefano Calzavara; Pietro Ferrara; Claudio Lucchese On Data Augmentation and Adversarial Risk: An Empirical Analysis.Hamid Eghbal-zadeh; Khaled Koutini; Paul Primus; Verena Haunschmid; Michal Lewandowski; Werner Zellinger; Bernhard A. Moser; Gerhard Widmer Understanding and Improving Fast Adversarial Training.Maksym Andriushchenko; Nicolas Flammarion Black-box Adversarial Example Generation with Normalizing Flows.Hadi M. Dolatabadi; Sarah Erfani; Christopher Leckie 2020-07-05 Adversarial Learning in the Cyber Security Domain.Ihai Rosenberg; Asaf Shabtai; Yuval Elovici; Lior Rokach 2020-07-04 On Connections between Regularizations for Improving DNN Robustness.Yiwen Guo; Long Chen; Yurong Chen; Changshui Zhang Relationship between manifold smoothness and adversarial vulnerability in deep learning with local errors.Zijian Jiang; Jianwen Zhou; Haiping Huang Deep Active Learning via Open Set Recognition. (1%)Jaya Krishna Mandivarapu; Blake Camp; Rolando Estrada 2020-07-03 Towards Robust Deep Learning with Ensemble Networks and Noisy Layers.Yuting Liang; Reza Samavi 2020-07-02 Efficient Proximal Mapping of the 1-path-norm of Shallow Networks.Fabian Latorre; Paul Rolland; Nadav Hallak; Volkan Cevher Deep Learning Defenses Against Adversarial Examples for Dynamic Risk Assessment.Xabier Echeberria-Barrio; Amaia Gil-Lerchundi; Ines Goicoechea-Telleria; Raul Orduna-Urrutia Decoder-free Robustness Disentanglement without (Additional) Supervision.Yifei Wang; Dan Peng; Furui Liu; Zhenguo Li; Zhitang Chen; Jiansheng Yang Increasing Trustworthiness of Deep Neural Networks via Accuracy Monitoring.Zhihui Shao; Jianyi Yang; Shaolei Ren Trace-Norm Adversarial Examples.Ehsan Kazemi; Thomas Kerdreux; Liqiang Wang Generating Adversarial Examples withControllable Non-transferability.Renzhi Wang; Tianwei Zhang; Xiaofei Xie; Lei Ma; Cong Tian; Felix Juefei-Xu; Yang Liu 2020-07-01 Fundamental Limits of Adversarial Learning.Kevin Bello; Qiuling Xu; Jean Honorio Unifying Model Explainability and Robustness via Machine-Checkable Concepts.Vedant Nanda; Till Speicher; John P. Dickerson; Krishna P. Gummadi; Muhammad Bilal Zafar Measuring Robustness to Natural Distribution Shifts in Image Classification.Rohan Taori; Achal Dave; Vaishaal Shankar; Nicholas Carlini; Benjamin Recht; Ludwig Schmidt Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks.Kishor Datta Gupta; Dipankar Dasgupta; Zahid Akhtar Query-Free Adversarial Transfer via Undertrained Surrogates.Chris Miller; Soroush Vosoughi Adversarial Example Games.Avishek Joey Bose; Gauthier Gidel; Hugo Berard; Andre Cianflone; Pascal Vincent; Simon Lacoste-Julien; William L. Hamilton Robustness against Relational Adversary.Yizhen Wang; Xiaozhu Meng; Ke Wang; Mihai Christodorescu; Somesh Jha Opportunities and Challenges in Deep Learning Adversarial Robustness: A Survey.Samuel Henrique Silva; Peyman Najafirad 2020-06-30 Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures.Jiachen Sun; Yulong Cao; Qi Alfred Chen; Z. Morley Mao Black-box Certification and Learning under Adversarial Perturbations.Hassan Ashtiani; Vinayak Pathak; Ruth Urner Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection.Deqiang Li; Qianmu Li Neural Network Virtual Sensors for Fuel Injection Quantities with Provable Performance Specifications.Eric Wong; Tim Schneider; Joerg Schmitt; Frank R. Schmidt; J. Zico Kolter Generating Adversarial Examples with an Optimized Quality.Aminollah Khormali; DaeHun Nyang; David Mohaisen 2020-06-29 Harnessing Adversarial Distances to Discover High-Confidence Errors.Walter Bennette; Karsten Maurer; Sean Sisti Sharp Statistical Guarantees for Adversarially Robust Gaussian Classification.Chen Dan; Yuting Wei; Pradeep Ravikumar Legal Risks of Adversarial Machine Learning Research.Ram Shankar Siva Kumar; Jonathon Penney; Bruce Schneier; Kendra Albert Biologically Inspired Mechanisms for Adversarial Robustness.Manish V. Reddy; Andrzej Banburski; Nishka Pant; Tomaso Poggio Improving Uncertainty Estimates through the Relationship with Adversarial Robustness.Yao Qin; Xuezhi Wang; Alex Beutel; Ed H. Chi 2020-06-28 FDA3 : Federated Defense Against Adversarial Attacks for Cloud-Based IIoT Applications.Yunfei Song; Tian Liu; Tongquan Wei; Xiangfeng Wang; Zhe Tao; Mingsong Chen Geometry-Inspired Top-k Adversarial Perturbations.Nurislam Tursynbek; Aleksandr Petiushko; Ivan Oseledets 2020-06-26 Orthogonal Deep Models As Defense Against Black-Box Attacks.Mohammad A. A. K. Jalwana; Naveed Akhtar; Mohammed Bennamoun; Ajmal Mian A Unified Framework for Analyzing and Detecting Malicious Examples of DNN Models.Kaidi Jin; Tianwei Zhang; Chao Shen; Yufei Chen; Ming Fan; Chenhao Lin; Ting Liu Informative Outlier Matters: Robustifying Out-of-distribution Detection Using Outlier Mining.Jiefeng Chen; Yixuan Li; Xi Wu; Yingyu Liang; Somesh Jha Diverse Knowledge Distillation (DKD): A Solution for Improving The Robustness of Ensemble Models Against Adversarial Attacks.Ali Mirzaeian; Jana Kosecka; Houman Homayoun; Tinoosh Mohsenin; Avesta Sasan 2020-06-25 Smooth Adversarial Training.Cihang Xie; Mingxing Tan; Boqing Gong; Alan Yuille; Quoc V. Le Does Adversarial Transferability Indicate Knowledge Transferability?Kaizhao Liang; Jacky Y. Zhang; Oluwasanmi Koyejo; Bo Li Proper Network Interpretability Helps Adversarial Robustness in Classification.Akhilan Boopathy; Sijia Liu; Gaoyuan Zhang; Cynthia Liu; Pin-Yu Chen; Shiyu Chang; Luca Daniel Can 3D Adversarial Logos Cloak Humans?Yi Wang; Jingyang Zhou; Tianlong Chen; Sijia Liu; Shiyu Chang; Chandrajit Bajaj; Zhangyang Wang 2020-06-24 Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks.Huiying Li; Shawn Shan; Emily Wenger; Jiayun Zhang; Haitao Zheng; Ben Y. Zhao Imbalanced Gradients: A New Cause of Overestimated Adversarial Robustness.Linxi Jiang; Xingjun Ma; Zejia Weng; James Bailey; Yu-Gang Jiang Defending against adversarial attacks on medical imaging AI system, classification or detection?Xin Li; Deng Pan; Dongxiao Zhu Compositional Explanations of Neurons.Jesse Mu; Jacob Andreas 2020-06-23 Towards Robust Sensor Fusion in Visual Perception.Shaojie Wang; Tong Wu; Yevgeniy Vorobeychik Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks.Francesco Croce; Maksym Andriushchenko; Naman D. Singh; Nicolas Flammarion; Matthias Hein RayS: A Ray Searching Method for Hard-label Adversarial Attack.Jinghui Chen; Quanquan Gu 2020-06-22 Learning to Generate Noise for Robustness against Multiple Perturbations.Divyam Madaan; Jinwoo Shin; Sung Ju Hwang Perceptual Adversarial Robustness: Defense Against Unseen Threat Models.Cassidy Laidlaw; Sahil Singla; Soheil Feizi 2020-06-21 Network Moments: Extensions and Sparse-Smooth Attacks.Modar Alfadly; Adel Bibi; Emilio Botero; Salman Alsubaihi; Bernard Ghanem 2020-06-20 How do SGD hyperparameters in natural training affect adversarial robustness?Sandesh Kamath; Amit Deshpande; K V Subrahmanyam Defense against Adversarial Attacks in NLP via Dirichlet Neighborhood Ensemble.Yi Zhou; Xiaoqing Zheng; Cho-Jui Hsieh; Kai-wei Chang; Xuanjing Huang 2020-06-19 Using Learning Dynamics to Explore the Role of Implicit Regularization in Adversarial Examples.Josue Ortega Caro; Yilong Ju; Ryan Pyle; Ankit Patel A general framework for defining and optimizing robustness.Alessandro Tibo; Manfred Jaeger; Kim G. Larsen Analyzing the Real-World Applicability of DGA Classifiers.Arthur Drichel; Ulrike Meyer; Samuel Schüppen; Dominik Teubert Towards an Adversarially Robust Normalization Approach.Muhammad Awais; Fahad Shamshad; Sung-Ho Bae Differentiable Language Model Adversarial Attacks on Categorical Sequence Classifiers.I. Fursov; A. Zaytsev; N. Kluchnikov; A. Kravchenko; E. Burnaev Adversarial Attacks for Multi-view Deep Models.Xuli Sun; Shiliang Sun 2020-06-18 Local Competition and Uncertainty for Adversarial Robustness in Deep Learning.Antonios Alexos; Konstantinos P. Panousis; Sotirios Chatzis Dissecting Deep Networks into an Ensemble of Generative Classifiers for Robust Predictions.Lokender Tiwari; Anish Madan; Saket Anand; Subhashis Banerjee The Dilemma Between Dimensionality Reduction and Adversarial Robustness.Sheila Alemany; Niki Pissinou Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples.Kaleel Mahmood; Deniz Gurevin; Dijk Marten van; Phuong Ha Nguyen 2020-06-17 Noise or Signal: The Role of Image Backgrounds in Object Recognition.Kai Xiao; Logan Engstrom; Andrew Ilyas; Aleksander Madry Adversarial Examples Detection and Analysis with Layer-wise Autoencoders.Bartosz Wójcik; Paweł Morawiecki; Marek Śmieja; Tomasz Krzyżek; Przemysław Spurek; Jacek Tabor Adversarial Defense by Latent Style Transformations.Shuo Wang; Surya Nepal; Marthie Grobler; Carsten Rudolph; Tianle Chen; Shangyu Chen Disrupting Deepfakes with an Adversarial Attack that Survives Training.Eran Segalis Universal Lower-Bounds on Classification Error under Adversarial Attacks and Random Corruption.Elvis Dohmatob Fairness Through Robustness: Investigating Robustness Disparity in Deep Learning.Vedant Nanda; Samuel Dooley; Sahil Singla; Soheil Feizi; John P. Dickerson 2020-06-16 Calibrating Deep Neural Network Classifiers on Out-of-Distribution Datasets.Zhihui Shao; Jianyi Yang; Shaolei Ren SPLASH: Learnable Activation Functions for Improving Accuracy and Adversarial Robustness.Mohammadamin Tavakoli; Forest Agostinelli; Pierre Baldi Debona: Decoupled Boundary Network Analysis for Tighter Bounds and Faster Adversarial Robustness Proofs.Christopher Brix; Thomas Noll On sparse connectivity, adversarial robustness, and a novel model of the artificial neuron.Sergey Bochkanov AdvMind: Inferring Adversary Intent of Black-Box Attacks.Ren Pang; Xinyang Zhang; Shouling Ji; Xiapu Luo; Ting Wang The shape and simplicity biases of adversarially robust ImageNet-trained CNNs.Peijie Chen; Chirag Agarwal; Anh Nguyen 2020-06-15 Total Deep Variation: A Stable Regularizer for Inverse Problems.Erich Kobler; Alexander Effland; Karl Kunisch; Thomas Pock DefenseVGAE: Defending against Adversarial Attacks on Graph Data via a Variational Graph Autoencoder.Ao Zhang; Jinwen Ma Improving Adversarial Robustness via Unlabeled Out-of-Domain Data.Zhun Deng; Linjun Zhang; Amirata Ghorbani; James Zou Fast & Accurate Method for Bounding the Singular Values of Convolutional Layers with Application to Lipschitz Regularization.Alexandre Araujo; Benjamin Negrevergne; Yann Chevaleyre; Jamal Atif GNNGuard: Defending Graph Neural Networks against Adversarial Attacks.Xiang Zhang; Marinka Zitnik CG-ATTACK: Modeling the Conditional Distribution of Adversarial Perturbations to Boost Black-Box Attack.Yan Feng; Baoyuan Wu; Yanbo Fan; Li Liu; Zhifeng Li; Shutao Xia Multiscale Deep Equilibrium Models.Shaojie Bai; Vladlen Koltun; J. Zico Kolter 2020-06-14 GradAug: A New Regularization Method for Deep Neural Networks.Taojiannan Yang; Sijie Zhu; Chen Chen PatchUp: A Regularization Technique for Convolutional Neural Networks.Mojtaba Faramarzi; Mohammad Amini; Akilesh Badrinaaraayanan; Vikas Verma; Sarath Chandar On Saliency Maps and Adversarial Robustness.Puneet Mangla; Vedant Singh; Vineeth N Balasubramanian On the transferability of adversarial examples between convex and 01 loss models.Yunzhe Xue; Meiyan Xie; Usman Roshan Adversarial Attacks and Detection on Reinforcement Learning-Based Interactive Recommender Systems.Yuanjiang Cao; Xiaocong Chen; Lina Yao; Xianzhi Wang; Wei Emma Zhang Sparsity Turns Adversarial: Energy and Latency Attacks on Deep Neural Networks.Sarada Krithivasan; Sanchari Sen; Anand Raghunathan 2020-06-13 ClustTR: Clustering Training for Robustness.Motasem Alfarra; Juan C. Pérez; Adel Bibi; Ali Thabet; Pablo Arbeláez; Bernard Ghanem The Pitfalls of Simplicity Bias in Neural Networks.Harshay Shah; Kaustav Tamuly; Aditi Raghunathan; Prateek Jain; Praneeth Netrapalli Adversarial Self-Supervised Contrastive Learning.Minseon Kim; Jihoon Tack; Sung Ju Hwang Defensive Approximation: Enhancing CNNs Security through Approximate Computing.Amira Guesmi; Ihsen Alouani; Khaled Khasawneh; Mouna Baklouti; Tarek Frikha; Mohamed Abid; Nael Abu-Ghazaleh 2020-06-12 Provably Robust Metric Learning.Lu Wang; Xuanqing Liu; Jinfeng Yi; Yuan Jiang; Cho-Jui Hsieh Defending against GAN-based Deepfake Attacks via Transformation-aware Adversarial Faces.Chaofei Yang; Lei Ding; Yiran Chen; Hai Li D-square-B: Deep Distribution Bound for Natural-looking Adversarial Attack.Qiuling Xu; Guanhong Tao; Xiangyu Zhang Targeted Adversarial Perturbations for Monocular Depth Prediction.Alex Wong; Safa Cicek; Stefano Soatto 2020-06-11 Large-Scale Adversarial Training for Vision-and-Language Representation Learning.Zhe Gan; Yen-Chun Chen; Linjie Li; Chen Zhu; Yu Cheng; Jingjing Liu Smoothed Geometry for Robust Attribution.Zifan Wang; Haofan Wang; Shakul Ramkumar; Matt Fredrikson; Piotr Mardziel; Anupam Datta Protecting Against Image Translation Deepfakes by Leaking Universal Perturbations from Black-Box Neural Networks.Nataniel Ruiz; Sarah Adel Bargal; Stan Sclaroff Investigating Robustness of Adversarial Samples Detection for Automatic Speaker Verification.Xu Li; Na Li; Jinghua Zhong; Xixin Wu; Xunying Liu; Dan Su; Dong Yu; Helen Meng Robustness to Adversarial Attacks in Learning-Enabled Controllers.Zikang Xiong; Joe Eappen; He Zhu; Suresh Jagannathan On the Tightness of Semidefinite Relaxations for Certifying Robustness to Adversarial Examples.Richard Y. Zhang Adversarial Attack Vulnerability of Medical Image Analysis Systems: Unexplored Factors.Suzanne C. Wetstein; Cristina González-Gonzalo; Gerda Bortsova; Bart Liefers; Florian Dubost; Ioannis Katramados; Laurens Hogeweg; Ginneken Bram van; Josien P. W. Pluim; Bruijne Marleen de; Clara I. Sánchez; Mitko Veta Achieving robustness in classification using optimal transport with hinge regularization.Mathieu Serrurier; Franck Mamalet; Alberto González-Sanz; Thibaut Boissin; Jean-Michel Loubes; Barrio Eustasio del 2020-06-10 Evaluating Graph Vulnerability and Robustness using TIGER.Scott Freitas; Duen Horng Chau Towards Robust Fine-grained Recognition by Maximal Separation of Discriminative Features.Krishna Kanth Nakka; Mathieu Salzmann Deterministic Gaussian Averaged Neural Networks.Ryan Campbell; Chris Finlay; Adam M Oberman Interpolation between Residual and Non-Residual Networks.Zonghan Yang; Yang Liu; Chenglong Bao; Zuoqiang Shi Towards Certified Robustness of Metric Learning.Xiaochen Yang; Yiwen Guo; Mingzhi Dong; Jing-Hao Xue 2020-06-09 Towards an Intrinsic Definition of Robustness for a Classifier.Théo Giraudon; Vincent Gripon; Matthias Löwe; Franck Vermet Black-Box Adversarial Attacks on Graph Neural Networks with Limited Node Access.Jiaqi Ma; Shuangrui Ding; Qiaozhu Mei GAP++: Learning to generate target-conditioned adversarial examples.Xiaofeng Mao; Yuefeng Chen; Yuhong Li; Yuan He; Hui Xue Adversarial Attacks on Brain-Inspired Hyperdimensional Computing-Based Classifiers.Fangfang Yang; Shaolei Ren Provable tradeoffs in adversarially robust classification.Edgar Dobriban; Hamed Hassani; David Hong; Alexander Robey 2020-06-08 Calibrated neighborhood aware confidence measure for deep metric learning.Maryna Karpusha; Sunghee Yun; Istvan Fehervari A Self-supervised Approach for Adversarial Robustness.Muzammal Naseer; Salman Khan; Munawar Hayat; Fahad Shahbaz Khan; Fatih Porikli Distributional Robustness with IPMs and links to Regularization and GANs.Hisham Husain On Universalized Adversarial and Invariant Perturbations.Sandesh Kamath; Amit Deshpande; K V Subrahmanyam Adversarial Feature Desensitization.Pouya Bashivan; Blake Richards; Irina Rish Tricking Adversarial Attacks To Fail.Blerta Lindqvist Global Robustness Verification Networks.Weidi Sun; Yuteng Lu; Xiyue Zhang; Zhanxing Zhu; Meng Sun Provable trade-offs between private & robust machine learning.Jamie Hayes 2020-06-07 Extensions and limitations of randomized smoothing for robustness guarantees.Jamie Hayes Uncertainty-Aware Deep Classifiers using Generative Models.Murat Sensoy; Lance Kaplan; Federico Cerutti; Maryam Saleki 2020-06-06 Unique properties of adversarially trained linear classifiers on Gaussian data.Jamie Hayes Can Domain Knowledge Alleviate Adversarial Attacks in Multi-Label Classifiers?Stefano Melacci; Gabriele Ciravegna; Angelo Sotgiu; Ambra Demontis; Battista Biggio; Marco Gori; Fabio Roli 2020-06-05 Sponge Examples: Energy-Latency Attacks on Neural Networks.Ilia Shumailov; Yiren Zhao; Daniel Bates; Nicolas Papernot; Robert Mullins; Ross Anderson Adversarial Image Generation and Training for Deep Convolutional Neural Networks.Ronghua Shi; Hai Shu; Hongtu Zhu; Ziqi Chen Lipschitz Bounds and Provably Robust Training by Laplacian Smoothing.Vishaal Krishnan; Abed AlRahman Al Makdah; Fabio Pasqualetti 2020-06-04 Characterizing the Weight Space for Different Learning Models.Saurav Musunuru; Jay N. Paranjape; Rahul Kumar Dubey; Vijendran G. Venkoparao Towards Understanding Fast Adversarial Training.Bai Li; Shiqi Wang; Suman Jana; Lawrence Carin Defense for Black-box Attacks on Anti-spoofing Models by Self-Supervised Learning.Haibin Wu; Andy T. Liu; Hung-yi Lee Pick-Object-Attack: Type-Specific Adversarial Attack for Object Detection.Omid Mohamad Nezami; Akshay Chaturvedi; Mark Dras; Utpal Garain 2020-06-02 SaliencyMix: A Saliency Guided Data Augmentation Strategy for Better Regularization.A. F. M. Shahab Uddin; Mst. Sirazam Monira; Wheemyung Shin; TaeChoong Chung; Sung-Ho Bae Exploring the role of Input and Output Layers of a Deep Neural Network in Adversarial Defense.Jay N. Paranjape; Rahul Kumar Dubey; Vijendran V Gopalan Perturbation Analysis of Gradient-based Adversarial Attacks.Utku Ozbulak; Manvel Gasparyan; Neve Wesley De; Messem Arnout Van Adversarial Item Promotion: Vulnerabilities at the Core of Top-N Recommenders that Use Images to Address Cold Start.Zhuoran Liu; Martha Larson Detecting Audio Attacks on ASR Systems with Dropout Uncertainty.Tejas Jayashankar; Jonathan Le Roux; Pierre Moulin 2020-06-01 Second-Order Provable Defenses against Adversarial Attacks.Sahil Singla; Soheil Feizi Adversarial Attacks on Reinforcement Learning based Energy Management Systems of Extended Range Electric Delivery Vehicles.Pengyue Wang; Yan Li; Shashi Shekhar; William F. Northrop Adversarial Attacks on Classifiers for Eye-based User Modelling.Inken CISPA Helmholtz Center for Information Security Hagestedt; Michael CISPA Helmholtz Center for Information Security Backes; Andreas University of Stuttgart Bulling Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods.Kyungmi Lee; Anantha P. Chandrakasan 2020-05-31 Evaluations and Methods for Explanation through Robustness Analysis.Cheng-Yu Hsieh; Chih-Kuan Yeh; Xuanqing Liu; Pradeep Ravikumar; Seungyeon Kim; Sanjiv Kumar; Cho-Jui Hsieh Estimating Principal Components under Adversarial Perturbations.Pranjal Awasthi; Xue Chen; Aravindan Vijayaraghavan 2020-05-30 Exploring Model Robustness with Adaptive Networks and Improved Adversarial Training.Zheng Xu; Ali Shafahi; Tom Goldstein 2020-05-29 SAFER: A Structure-free Approach for Certified Robustness to Adversarial Word Substitutions.Mao Ye; Chengyue Gong; Qiang Liu 2020-05-28 Monocular Depth Estimators: Vulnerabilities and Attacks.Alwyn Mathew; Aditya Prakash Patra; Jimson Mathew QEBA: Query-Efficient Boundary-Based Blackbox Attack.Huichen Li; Xiaojun Xu; Xiaolu Zhang; Shuang Yang; Bo Li Adversarial Attacks and Defense on Texts: A Survey.Aminul Huq; Mst. Tasnim Pervin Adversarial Robustness of Deep Convolutional Candlestick Learner.Jun-Hao Chen; Samuel Yen-Chi Chen; Yun-Cheng Tsai; Chih-Shiang Shur 2020-05-27 Enhancing Resilience of Deep Learning Networks by Means of Transferable Adversaries.Moritz Seiler; Heike Trautmann; Pascal Kerschke Calibrated Surrogate Losses for Adversarially Robust Classification.Han Bao; Clayton Scott; Masashi Sugiyama Mitigating Advanced Adversarial Attacks with More Advanced Gradient Obfuscation Techniques.Han Qiu; Yi Zeng; Qinkai Zheng; Tianwei Zhang; Meikang Qiu; Gerard Memmi Stochastic Security: Adversarial Defense Using Long-Run Dynamics of Energy-Based Models.Mitch Hill; Jonathan Mitchell; Song-Chun Zhu 2020-05-26 Effects of Forward Error Correction on Communications Aware Evasion Attacks.Matthew DelVecchio; Bryse Flowers; William C. Headley Investigating a Spectral Deception Loss Metric for Training Machine Learning-based Evasion Attacks.Matthew DelVecchio; Vanessa Arndorfer; William C. Headley Generating Semantically Valid Adversarial Questions for TableQA.Yi Zhu; Menglin Xia; Yiwei Zhou 2020-05-25 Adversarial Feature Selection against Evasion Attacks.Fei Zhang; Patrick P. K. Chan; Battista Biggio; Daniel S. Yeung; Fabio Roli 2020-05-24 Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification.Sina Däubener; Lea Schönherr; Asja Fischer; Dorothea Kolossa Adaptive Adversarial Logits Pairing.Shangxi Wu; Jitao Sang; Kaiyuan Xu; Guanhua Zheng; Changsheng Xu SoK: Arms Race in Adversarial Malware Detection.Deqiang Li; Qianmu Li; Yanfang Ye; Shouhuai Xu 2020-05-23 ShapeAdv: Generating Shape-Aware Adversarial 3D Point Clouds.Kibok Lee; Zhuoyuan Chen; Xinchen Yan; Raquel Urtasun; Ersin Yumer Adversarial Attack on Hierarchical Graph Pooling Neural Networks.Haoteng Tang; Guixiang Ma; Yurong Chen; Lei Guo; Wei Wang; Bo Zeng; Liang Zhan 2020-05-22 Vulnerability of deep neural networks for detecting COVID-19 cases from chest X-ray images to universal adversarial attacks.Hokuto Hirano; Kazuki Koga; Kazuhiro Takemoto 2020-05-21 Revisiting Role of Autoencoders in Adversarial Settings.Byeong Cheon Kim; Jung Uk Kim; Hakmin Lee; Yong Man Ro Robust Ensemble Model Training via Random Layer Sampling Against Adversarial Attack.Hakmin Lee; Hong Joo Lee; Seong Tae Kim; Yong Man Ro Inaudible Adversarial Perturbations for Targeted Attack in Speaker Recognition.Qing Wang; Pengcheng Guo; Lei Xie Investigating Vulnerability to Adversarial Examples on Multimodal Data Fusion in Deep Learning.Youngjoon Yu; Hong Joo Lee; Byeong Cheon Kim; Jung Uk Kim; Yong Man Ro 2020-05-20 Graph Structure Learning for Robust Graph Neural Networks.Wei Jin; Yao Ma; Xiaorui Liu; Xianfeng Tang; Suhang Wang; Jiliang Tang Feature Purification: How Adversarial Training Performs Robust Deep Learning.Zeyuan Allen-Zhu; Yuanzhi Li Model-Based Robust Deep Learning: Generalizing to Natural, Out-of-Distribution Data.Alexander Robey; Hamed Hassani; George J. Pappas An Adversarial Approach for Explaining the Predictions of Deep Neural Networks.Arash Rahnama; Andrew Tseng A survey on Adversarial Recommender Systems: from Attack/Defense strategies to Generative Adversarial Networks.Yashar Deldjoo; Noia Tommaso Di; Felice Antonio Merra 2020-05-19 Synthesizing Unrestricted False Positive Adversarial Objects Using Generative Models.Martin Kotuliak; Sandro E. Schoenborn; Andrei Dan Bias-based Universal Adversarial Patch Attack for Automatic Check-out.Aishan Liu; Jiakai Wang; Xianglong Liu; Bowen Cao; Chongzhi Zhang; Hang Yu 2020-05-18 An Evasion Attack against ML-based Phishing URL Detectors.Bushra University of Adelaide, CREST - The Centre for Research on Engineering Software Technologies, CSIROs Data61 Sabir; M. Ali University of Adelaide, CREST - The Centre for Research on Engineering Software Technologies Babar; Raj CSIROs Data61 Gaire Universalization of any adversarial attack using very few test examples.Sandesh Kamath; Amit Deshpande; K V Subrahmanyam On Intrinsic Dataset Properties for Adversarial Machine Learning.Jeffrey Z. Pan; Nicholas Zufelt Increasing-Margin Adversarial (IMA) Training to Improve Adversarial Robustness of Neural Networks.Linhai Ma; Liang Liang Defending Your Voice: Adversarial Attack on Voice Conversion.Chien-yu Huang; Yist Y. Lin; Hung-yi Lee; Lin-shan Lee Improve robustness of DNN for ECG signal classification:a noise-to-signal ratio perspective.Linhai Ma; Liang Liang Spatiotemporal Attacks for Embodied Agents.Aishan Liu; Tairan Huang; Xianglong Liu; Yitao Xu; Yuqing Ma; Xinyun Chen; Stephen J. Maybank; Dacheng Tao 2020-05-17 Toward Adversarial Robustness by Diversity in an Ensemble of Specialized Deep Neural Networks.Mahdieh Abbasi; Arezoo Rajabi; Christian Gagne; Rakesh B. Bobba 2020-05-16 Universal Adversarial Perturbations: A Survey.Ashutosh Chaubey; Nikhil Agrawal; Kavya Barnwal; Keerat K. Guliani; Pramod Mehta Encryption Inspired Adversarial Defense for Visual Classification.MaungMaung AprilPyone; Hitoshi Kiya PatchGuard: Provable Defense against Adversarial Patches Using Masks on Small Receptive Fields.Chong Xiang; Arjun Nitin Bhagoji; Vikash Sehwag; Prateek Mittal 2020-05-15 How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy.Brian Kim; Yalin E. Sagduyu; Kemal Davaslioglu; Tugba Erpek; Sennur Ulukus Practical Traffic-space Adversarial Attacks on Learning-based NIDSs.Dongqi Han; Zhiliang Wang; Ying Zhong; Wenqi Chen; Jiahai Yang; Shuqiang Lu; Xingang Shi; Xia Yin Initializing Perturbations in Multiple Directions for Fast Adversarial Training.Xunguang Wang; Ship Peng Xu; Eric Ke Wang 2020-05-14 Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning.Jianwen Sun; Tianwei Zhang; Xiaofei Xie; Lei Ma; Yan Zheng; Kangjie Chen; Yang Liu Towards Assessment of Randomized Mechanisms for Certifying Adversarial Robustness.Tianhang Zheng; Di Wang; Baochun Li; Jinhui Xu A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification.Ahmed Abusnaina; Mohammed Abuhamad; Hisham Alasmary; Afsah Anwar; Rhongho Jang; Saeed Salem; DaeHun Nyang; David Mohaisen 2020-05-13 DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses.Yaxin Li; Wei Jin; Han Xu; Jiliang Tang 2020-05-12 Effective and Robust Detection of Adversarial Examples via Benford-Fourier Coefficients.Chengcheng Ma; Baoyuan Wu; Shibiao Xu; Yanbo Fan; Yong Zhang; Xiaopeng Zhang; Zhifeng Li Evaluating Ensemble Robustness Against Adversarial Attacks.George Adam; Romain Speciel Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks.Wenjie Li; Benedetta Tondi; Rongrong Ni; Mauro Barni Adversarial examples are useful too!Ali Borji 2020-05-11 Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers.Brian Kim; Yalin E. Sagduyu; Kemal Davaslioglu; Tugba Erpek; Sennur Ulukus Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data.Lu Wang; Huan Zhang; Jinfeng Yi; Cho-Jui Hsieh; Yuan Jiang 2020-05-09 It's Morphin' Time! Combating Linguistic Discrimination with Inflectional Perturbations.Samson Tan; Shafiq Joty; Min-Yen Kan; Richard Socher Class-Aware Domain Adaptation for Improving Adversarial Robustness.Xianxu Hou; Jingxin Liu; Bolei Xu; Xiaolong Wang; Bozhi Liu; Guoping Qiu 2020-05-08 Towards Robustness against Unsuspicious Adversarial Examples.Liang Tong; Minzhe Guo; Atul Prakash; Yevgeniy Vorobeychik 2020-05-07 Efficient Exact Verification of Binarized Neural Networks.Kai Jia; Martin Rinard Projection & Probability-Driven Black-Box Attack.Jie Li; Rongrong Ji; Hong Liu; Jianzhuang Liu; Bineng Zhong; Cheng Deng; Qi Tian Defending Hardware-based Malware Detectors against Adversarial Attacks.Abraham Peedikayil Kuruvila; Shamik Kundu; Kanad Basu 2020-05-06 GraCIAS: Grassmannian of Corrupted Images for Adversarial Security.Ankita Shukla; Pavan Turaga; Saket Anand Training robust neural networks using Lipschitz bounds.Patricia Pauli; Anne Koch; Julian Berberich; Paul Kohler; Frank Allgöwer 2020-05-05 Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder.Guanlin Li; Shuya Ding; Jun Luo; Chang Liu Hacking the Waveform: Generalized Wireless Adversarial Deep Learning.Francesco Restuccia; Salvatore D'Oro; Amani Al-Shawabka; Bruno Costa Rendon; Kaushik Chowdhury; Stratis Ioannidis; Tommaso Melodia Proper measure for adversarial robustness.Hyeongji Kim; Ketil Malde Adversarial Training against Location-Optimized Adversarial Patches.Sukrut Rao; David Stutz; Bernt Schiele 2020-05-04 On the Benefits of Models with Perceptually-Aligned Gradients.Gunjan Aggarwal; Abhishek Sinha; Nupur Kumari; Mayank Singh Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?Marco Melis; Michele Scalas; Ambra Demontis; Davide Maiorca; Battista Biggio; Giorgio Giacinto; Fabio Roli 2020-05-03 Robust Encodings: A Framework for Combating Adversarial Typos.Erik Jones; Robin Jia; Aditi Raghunathan; Percy Liang 2020-05-01 Jacks of All Trades, Masters Of None: Addressing Distributional Shift and Obtrusiveness via Transparent Patch Attacks.Neil Fendley; Max Lennon; I-Jeng Wang; Philippe Burlina; Nathan Drenkow Birds have four legs?! NumerSense: Probing Numerical Commonsense Knowledge of Pre-trained Language Models.Bill Yuchen Lin; Seyeon Lee; Rahul Khanna; Xiang Ren Robust Deep Learning as Optimal Control: Insights and Convergence Guarantees.Jacob H. Seidman; Mahyar Fazlyab; Victor M. Preciado; George J. Pappas Defense of Word-level Adversarial Attacks via Random Substitution Encoding.Zhaoyang Wang; Hongtao Wang 2020-04-30 Evaluating Neural Machine Comprehension Model Robustness to Noisy Inputs and Adversarial Attacks.Winston Wu; Dustin Arendt; Svitlana Volkova Imitation Attacks and Defenses for Black-box Machine Translation Systems.Eric Wallace; Mitchell Stern; Dawn Song Universal Adversarial Attacks with Natural Triggers for Text Classification.Liwei Song; Xinwei Yu; Hsuan-Tung Peng; Karthik Narasimhan Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness.Pu Zhao; Pin-Yu Chen; Payel Das; Karthikeyan Natesan Ramamurthy; Xue Lin 2020-04-29 Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability.Nathan Inkawhich; Kevin J Liang; Binghui Wang; Matthew Inkawhich; Lawrence Carin; Yiran Chen TAVAT: Token-Aware Virtual Adversarial Training for Language Understanding.Linyang Li; Xipeng Qiu TextAttack: A Framework for Adversarial Attacks, Data Augmentation, and Adversarial Training in NLP.John X. Morris; Eli Lifland; Jin Yong Yoo; Jake Grigsby; Di Jin; Yanjun Qi 2020-04-28 Adversarial Learning Guarantees for Linear Hypotheses and Neural Networks.Pranjal Awasthi; Natalie Frank; Mehryar Mohri Minority Reports Defense: Defending Against Adversarial Patches.Michael McCoyd; Won Park; Steven Chen; Neil Shah; Ryan Roggenkemper; Minjune Hwang; Jason Xinyu Liu; David Wagner 2020-04-27 DeSePtion: Dual Sequence Prediction and Adversarial Examples for Improved Fact-Checking.Christopher Hidey; Tuhin Chakrabarty; Tariq Alhindi; Siddharth Varia; Kriste Krstovski; Mona Diab; Smaranda Muresan Adversarial Fooling Beyond "Flipping the Label".Konda Reddy Mopuri; Vaisakh Shaj; R. Venkatesh Babu 2020-04-26 Improved Image Wasserstein Attacks and Defenses.J. Edward Hu; Adith Swaminathan; Hadi Salman; Greg Yang Transferable Perturbations of Deep Feature Distributions.Nathan Inkawhich; Kevin J Liang; Lawrence Carin; Yiran Chen Towards Feature Space Adversarial Attack.Qiuling Xu; Guanhong Tao; Siyuan Cheng; Xiangyu Zhang Printing and Scanning Attack for Image Counter Forensics.Hailey James; Otkrist Gupta; Dan Raviv 2020-04-25 Improved Adversarial Training via Learned Optimizer.Yuanhao Xiong; Cho-Jui Hsieh Enabling Fast and Universal Audio Adversarial Attack Using Generative Model.Yi Xie; Zhuohang Li; Cong Shi; Jian Liu; Yingying Chen; Bo Yuan Harnessing adversarial examples with a surprisingly simple defense.Ali Borji 2020-04-24 Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty.Xiyue Zhang; Xiaofei Xie; Lei Ma; Xiaoning Du; Qiang Hu; Yang Liu; Jianjun Zhao; Meng Sun One Sparse Perturbation to Fool them All, almost Always!Arka Ghosh; Sankha Subhra Mullick; Shounak Datta; Swagatam Das; Rammohan Mallipeddi; Asit Kr. Das Reevaluating Adversarial Examples in Natural Language.John X. Morris; Eli Lifland; Jack Lanchantin; Yangfeng Ji; Yanjun Qi 2020-04-23 Adversarial Machine Learning in Network Intrusion Detection Systems.Elie Alhajjar; Paul Maxwell; Nathaniel D. Bastian Adversarial Attacks and Defenses: An Interpretation Perspective.Ninghao Liu; Mengnan Du; Ruocheng Guo; Huan Liu; Xia Hu Evaluating Adversarial Robustness for Deep Neural Network Interpretability using fMRI Decoding.Patrick McClure; Dustin Moraczewski; Ka Chun Lam; Adam Thomas; Francisco Pereira On Adversarial Examples for Biomedical NLP Tasks.Vladimir Araujo; Andres Carvallo; Carlos Aspillaga; Denis Parra Ensemble Generative Cleaning with Feedback Loops for Defending Adversarial Attacks.Jianhe Yuan; Zhihai He Improved Noise and Attack Robustness for Semantic Segmentation by Using Multi-Task Training with Self-Supervised Depth Estimation.Marvin Klingner; Andreas Bär; Tim Fingscheidt RAIN: A Simple Approach for Robust and Accurate Image Classification Networks.Jiawei Du; Hanshu Yan; Vincent Y. F. Tan; Joey Tianyi Zhou; Rick Siow Mong Goh; Jiashi Feng 2020-04-22 CodNN -- Robust Neural Networks From Coded Classification.Netanel Andrew Raviv; Siddharth Andrew Jain; Pulakesh Andrew Upadhyaya; Jehoshua Andrew Bruck; Andrew Anxiao; Jiang Provably robust deep generative models.Filipe Condessa; Zico Kolter QUANOS- Adversarial Noise Sensitivity Driven Hybrid Quantization of Neural Networks.Priyadarshini Panda Adversarial examples and where to find them.Niklas Risse; Christina Göpfert; Jan Philip Göpfert 2020-04-21 Scalable Attack on Graph Data by Injecting Vicious Nodes.Jihong Wang; Minnan Luo; Fnu Suya; Jundong Li; Zijiang Yang; Qinghua Zheng Certifying Joint Adversarial Robustness for Model Ensembles.Mainuddin Ahmad Jonas; David Evans Probabilistic Safety for Bayesian Neural Networks.Matthew Wicker; Luca Laurenti; Andrea Patane; Marta Kwiatkowska BERT-ATTACK: Adversarial Attack Against BERT Using BERT.Linyang Li; Ruotian Ma; Qipeng Guo; Xiangyang Xue; Xipeng Qiu EMPIR: Ensembles of Mixed Precision Deep Networks for Increased Robustness against Adversarial Attacks.Sanchari Sen; Balaraman Ravindran; Anand Raghunathan 2020-04-20 GraN: An Efficient Gradient-Norm Based Detector for Adversarial and Misclassified Examples.Julia Lust; Alexandru Paul Condurache 2020-04-19 Dynamic Knowledge Graph-based Dialogue Generation with Improved Adversarial Meta-Learning.Hongcai Xu; Junpeng Bao; Gaojie Zhang Adversarial Training for Large Neural Language Models.Xiaodong Liu; Hao Cheng; Pengcheng He; Weizhu Chen; Yu Wang; Hoifung Poon; Jianfeng Gao Headless Horseman: Adversarial Attacks on Transfer Learning Models.Ahmed Abdelkader; Michael J. Curry; Liam Fowl; Tom Goldstein; Avi Schwarzschild; Manli Shu; Christoph Studer; Chen Zhu 2020-04-18 Protecting Classifiers From Attacks. A Bayesian Approach.Victor Gallego; Roi Naveiro; Alberto Redondo; David Rios Insua; Fabrizio Ruggeri Single-step Adversarial training with Dropout Scheduling.Vivek B. S.; R. Venkatesh Babu 2020-04-17 Adversarial Attack on Deep Learning-Based Splice Localization.Andras Rozsa; Zheng Zhong; Terrance E. Boult 2020-04-16 Shortcut Learning in Deep Neural Networks.Robert Geirhos; Jörn-Henrik Jacobsen; Claudio Michaelis; Richard Zemel; Wieland Brendel; Matthias Bethge; Felix A. Wichmann 2020-04-15 Targeted Attack for Deep Hashing based Retrieval.Jiawang Bai; Bin Chen; Yiming Li; Dongxian Wu; Weiwei Guo; Shu-tao Xia; En-hui Yang A Framework for Enhancing Deep Neural Networks Against Adversarial Malware.Deqiang Li; Qianmu Li; Yanfang Ye; Shouhuai Xu Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers.Yusi Lei; Sen Chen; Lingling Fan; Fu Song; Yang Liu 2020-04-14 On the Optimal Interaction Range for Multi-Agent Systems Under Adversarial Attack.Saad J Saleh Extending Adversarial Attacks to Produce Adversarial Class Probability Distributions.Jon Vadillo; Roberto Santana; Jose A. Lozano 2020-04-13 Adversarial robustness guarantees for random deep neural networks.Palma Giacomo De; Bobak T. Kiani; Seth Lloyd Frequency-Guided Word Substitutions for Detecting Textual Adversarial Examples.Maximilian Mozes; Pontus Stenetorp; Bennett Kleinberg; Lewis D. Griffin Adversarial Weight Perturbation Helps Robust Generalization.Dongxian Wu; Shu-tao Xia; Yisen Wang Adversarial Augmentation Policy Search for Domain and Cross-Lingual Generalization in Reading Comprehension.Adyasha Maharana; Mohit Bansal Towards Robust Classification with Image Quality Assessment.Yeli Feng; Yiyu Cai Towards Transferable Adversarial Attack against Deep Face Recognition.Yaoyao Zhong; Weihong Deng 2020-04-12 PatchAttack: A Black-box Texture-based Attack with Reinforcement Learning.Chenglin Yang; Adam Kortylewski; Cihang Xie; Yinzhi Cao; Alan Yuille 2020-04-11 Domain Adaptive Transfer Attack (DATA)-based Segmentation Networks for Building Extraction from Aerial Images.Younghwan Na; Jun Hee Kim; Kyungsu Lee; Juhum Park; Jae Youn Hwang; Jihwan P. Choi Certified Adversarial Robustness for Deep Reinforcement Learning.Michael Everett; Bjorn Lutjens; Jonathan P. How Robust Large-Margin Learning in Hyperbolic Space.Melanie Weber; Manzil Zaheer; Ankit Singh Rawat; Aditya Menon; Sanjiv Kumar Verification of Deep Convolutional Neural Networks Using ImageStars.Hoang-Dung Tran; Stanley Bak; Weiming Xiang; Taylor T. Johnson 2020-04-10 Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems.Eirini Anthi; Lowri Williams; Matilda Rhode; Pete Burnap; Adam Wedgbury Luring of transferable adversarial perturbations in the black-box paradigm.Rémi Bernhard; Pierre-Alain Moellic; Jean-Max Dutertre 2020-04-09 Blind Adversarial Training: Balance Accuracy and Robustness.Haidong Xie; Xueshuang Xiang; Naijin Liu; Bin Dong Blind Adversarial Pruning: Balance Accuracy, Efficiency and Robustness.Haidong Xie; Lixin Qian; Xueshuang Xiang; Naijin Liu On Adversarial Examples and Stealth Attacks in Artificial Intelligence Systems.Ivan Y. Tyukin; Desmond J. Higham; Alexander N. Gorban 2020-04-08 Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking.Hongjun Wang; Guangrun Wang; Ya Li; Dongyu Zhang; Liang Lin 2020-04-07 Towards Evaluating the Robustness of Chinese BERT Classifiers.Boxin Wang; Boyuan Pan; Xin Li; Bo Li Feature Partitioning for Robust Tree Ensembles and their Certification in Adversarial Scenarios.Stefano Calzavara; Claudio Lucchese; Federico Marcuzzi; Salvatore Orlando Learning to fool the speaker recognition.Jiguo Li; Xinfeng Zhang; Jizheng Xu; Li Zhang; Yue Wang; Siwei Ma; Wen Gao Universal Adversarial Perturbations Generative Network for Speaker Recognition.Jiguo Li; Xinfeng Zhang; Chuanmin Jia; Jizheng Xu; Li Zhang; Yue Wang; Siwei Ma; Wen Gao 2020-04-05 Approximate Manifold Defense Against Multiple Adversarial Perturbations.Jay Nandy; Wynne Hsu; Mong Li Lee 2020-04-04 Understanding (Non-)Robust Feature Disentanglement and the Relationship Between Low- and High-Dimensional Adversarial Attacks.Zuowen Wang; Leo Horne BAE: BERT-based Adversarial Examples for Text Classification.Siddhant Garg; Goutham Ramakrishnan 2020-04-03 Adversarial Robustness through Regularization: A Second-Order Approach.Avery Ma; Fartash Faghri; Amir-massoud Farahmand 2020-04-01 Evading Deepfake-Image Detectors with White- and Black-Box Attacks.Nicholas Carlini; Hany Farid Towards Achieving Adversarial Robustness by Enforcing Feature Consistency Across Bit Planes.Sravanti Addepalli; Vivek B. S.; Arya Baburaj; Gaurang Sriramanan; R. Venkatesh Babu Physically Realizable Adversarial Examples for LiDAR Object Detection.James Tu; Mengye Ren; Siva Manivasagam; Ming Liang; Bin Yang; Richard Du; Frank Cheng; Raquel Urtasun 2020-03-31 A Thorough Comparison Study on Adversarial Attacks and Defenses for Common Thorax Disease Classification in Chest X-rays.Chendi Rao; Jiezhang Cao; Runhao Zeng; Qi Chen; Huazhu Fu; Yanwu Xu; Mingkui Tan 2020-03-30 Characterizing Speech Adversarial Examples Using Self-Attention U-Net Enhancement.Chao-Han Huck Yang; Jun Qi; Pin-Yu Chen; Xiaoli Ma; Chin-Hui Lee Adversarial Attacks on Multivariate Time Series.Samuel Harford; Fazle Karim; Houshang Darabi Improved Gradient based Adversarial Attacks for Quantized Networks.Kartik Gupta; Thalaiyasingam Ajanthan Towards Deep Learning Models Resistant to Large Perturbations.Amirreza Shaeiri; Rozhin Nobahari; Mohammad Hossein Rohban Efficient Black-box Optimization of Adversarial Windows Malware with Constrained Manipulations.Luca Demetrio; Battista Biggio; Giovanni Lagorio; Fabio Roli; Alessandro Armando 2020-03-28 Adversarial Robustness: From Self-Supervised Pre-Training to Fine-Tuning.Tianlong Chen; Sijia Liu; Shiyu Chang; Yu Cheng; Lisa Amini; Zhangyang Wang DaST: Data-free Substitute Training for Adversarial Attacks.Mingyi Zhou; Jing Wu; Yipeng Liu; Shuaicheng Liu; Ce Zhu Adversarial Imitation Attack.Mingyi Zhou; Jing Wu; Yipeng Liu; Shuaicheng Liu; Xiang Zhang; Ce Zhu 2020-03-26 Do Deep Minds Think Alike? Selective Adversarial Attacks for Fine-Grained Manipulation of Multiple Deep Neural Networks.Zain Khan; Jirong Yi; Raghu Mudumbai; Xiaodong Wu; Weiyu Xu Challenging the adversarial robustness of DNNs based on error-correcting output codes.Bowen Zhang; Benedetta Tondi; Xixiang Lv; Mauro Barni 2020-03-25 Plausible Counterfactuals: Auditing Deep Learning Classifiers with Realistic Adversarial Examples.Alejandro Barredo-Arrieta; Ser Javier Del 2020-03-24 Adversarial Light Projection Attacks on Face Recognition Systems: A Feasibility Study.Luan Nguyen; Sunpreet S. Arora; Yuhang Wu; Hao Yang 2020-03-23 Defense Through Diverse Directions.Christopher M. Bender; Yang Li; Yifeng Shi; Michael K. Reiter; Junier B. Oliva Adversarial Attacks on Monocular Depth Estimation.Ziqi Zhang; Xinge Zhu; Yingwei Li; Xiangqun Chen; Yao Guo Inherent Adversarial Robustness of Deep Spiking Neural Networks: Effects of Discrete Input Encoding and Non-Linear Activations.Saima Sharmin; Nitin Rathi; Priyadarshini Panda; Kaushik Roy Adversarial Perturbations Fool Deepfake Detectors.Apurva Gandhi; Shomik Jain 2020-03-22 Understanding the robustness of deep neural network classifiers for breast cancer screening.Witold Oleszkiewicz; Taro Makino; Stanisław Jastrzębski; Tomasz Trzciński; Linda Moy; Kyunghyun Cho; Laura Heacock; Krzysztof J. Geras Architectural Resilience to Foreground-and-Background Adversarial Noise.Carl Cheng; Evan Hu 2020-03-21 Detecting Adversarial Examples in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression.Feiyang Cai; Jiani Li; Xenofon Koutsoukos Robust Out-of-distribution Detection in Neural Networks.Jiefeng Chen; Yixuan Li; Xi Wu; Yingyu Liang; Somesh Jha Cooling-Shrinking Attack: Blinding the Tracker with Imperceptible Noises.Bin Yan; Dong Wang; Huchuan Lu; Xiaoyun Yang 2020-03-20 Adversarial Examples and the Deeper Riddle of Induction: The Need for a Theory of Artifacts in Deep Learning.Cameron Buckner Investigating Image Applications Based on Spatial-Frequency Transform and Deep Learning Techniques.Qinkai Zheng; Han Qiu; Gerard Memmi; Isabelle Bloch Quantum noise protects quantum classifiers against adversaries.Yuxuan Du; Min-Hsiu Hsieh; Tongliang Liu; Dacheng Tao; Nana Liu One Neuron to Fool Them All.Anshuman Suri; David Evans Adversarial Robustness on In- and Out-Distribution Improves Explainability.Maximilian Augustin; Alexander Meinke; Matthias Hein 2020-03-19 Breaking certified defenses: Semantic adversarial examples with spoofed robustness certificates.Amin Ghiasi; Ali Shafahi; Tom Goldstein Face-Off: Adversarial Face Obfuscation.Varun Chandrasekaran; Chuhan Gao; Brian Tang; Kassem Fawaz; Somesh Jha; Suman Banerjee Robust Deep Reinforcement Learning against Adversarial Perturbations on State Observations.Huan Zhang; Hongge Chen; Chaowei Xiao; Bo Li; Mingyan Liu; Duane Boning; Cho-Jui Hsieh 2020-03-18 Vulnerabilities of Connectionist AI Applications: Evaluation and Defence.Christian Berghoff; Matthias Neu; Twickel Arndt von Improving Adversarial Robustness Through Progressive Hardening.Chawin Sitawarin; Supriyo Chakraborty; David Wagner Generating Socially Acceptable Perturbations for Efficient Evaluation of Autonomous Vehicles.Songan Zhang; Huei Peng; Subramanya Nageshrao; H. Eric Tseng Solving Non-Convex Non-Differentiable Min-Max Games using Proximal Gradient Method.Babak Barazandeh; Meisam Razaviyayn 2020-03-17 Motion-Excited Sampler: Video Adversarial Attack with Sparked Prior.Hu Zhang; Linchao Zhu; Yi Zhu; Yi Yang Heat and Blur: An Effective and Fast Defense Against Adversarial Examples.Haya Brama; Tal Grinshpoun Adversarial Transferability in Wearable Sensor Systems.Ramesh Kumar Sah; Hassan Ghasemzadeh 2020-03-15 Towards Privacy Protection by Generating Adversarial Identity Masks.Xiao Yang; Yinpeng Dong; Tianyu Pang; Jun Zhu; Hang Su Output Diversified Initialization for Adversarial Attacks.Yusuke Tashiro; Yang Song; Stefano Ermon Anomalous Example Detection in Deep Learning: A Survey.Saikiran Bulusu; Bhavya Kailkhura; Bo Li; Pramod K. Varshney; Dawn Song Toward Adversarial Robustness via Semi-supervised Robust Training.Yiming Li; Baoyuan Wu; Yan Feng; Yanbo Fan; Yong Jiang; Zhifeng Li; Shutao Xia 2020-03-14 Dynamic Divide-and-Conquer Adversarial Training for Robust Semantic Segmentation.Xiaogang Xu; Hengshuang Zhao; Jiaya Jia Minimum-Norm Adversarial Examples on KNN and KNN-Based Models.Chawin Sitawarin; David Wagner VarMixup: Exploiting the Latent Space for Robust Training and Inference.Puneet Mangla; Vedant Singh; Shreyas Jayant Havaldar; Vineeth N Balasubramanian Certified Defenses for Adversarial Patches.Ping-Yeh Chiang; Renkun Ni; Ahmed Abdelkader; Chen Zhu; Christoph Studer; Tom Goldstein 2020-03-13 Towards a Resilient Machine Learning Classifier -- a Case Study of Ransomware Detection.Chih-Yuan Yang; Ravi Sahita GeoDA: a geometric framework for black-box adversarial attacks.Ali Rahmati; Seyed-Mohsen Moosavi-Dezfooli; Pascal Frossard; Huaiyu Dai When are Non-Parametric Methods Robust?Robi Bhattacharjee; Kamalika Chaudhuri 2020-03-12 Topological Effects on Attacks Against Vertex Classification.Benjamin A. Miller; Mustafa Çamurcu; Alexander J. Gomez; Kevin Chan; Tina Eliassi-Rad Inline Detection of DGA Domains Using Side Information.Raaghavi Sivaguru; Jonathan Peck; Femi Olumofin; Anderson Nascimento; Cock Martine De ARAE: Adversarially Robust Training of Autoencoders Improves Novelty Detection.Mohammadreza Salehi; Atrin Arya; Barbod Pajoum; Mohammad Otoofi; Amirreza Shaeiri; Mohammad Hossein Rohban; Hamid R. Rabiee ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems.Jiangnan Li; Yingyuan Yang; Jinyuan Stella Sun; Kevin Tomsovic; Hairong Qi 2020-03-11 Frequency-Tuned Universal Adversarial Attacks.Yingpeng Deng; Lina J. Karam 2020-03-10 SAD: Saliency-based Defenses Against Adversarial Examples.Richard Tran; David Patrick; Michael Geyer; Amanda Fernandez Using an ensemble color space model to tackle adversarial examples.Shreyank N Gowda; Chun Yuan Cryptanalytic Extraction of Neural Network Models.Nicholas Carlini; Matthew Jagielski; Ilya Mironov A Survey of Adversarial Learning on Graphs.Liang Chen; Jintang Li; Jiaying Peng; Tao Xie; Zengxu Cao; Kun Xu; Xiangnan He; Zibin Zheng 2020-03-09 Domain Adaptation with Conditional Distribution Matching and Generalized Label Shift.Remi Tachet des Combes; Han Zhao; Yu-Xiang Wang; Geoff Gordon Towards Probabilistic Verification of Machine Unlearning.David Marco Sommer; Liwei Song; Sameer Wagh; Prateek Mittal Manifold Regularization for Locally Stable Deep Neural Networks.Charles Jin; Martin Rinard Generating Natural Language Adversarial Examples on a Large Scale with Generative Models.Yankun Ren; Jianbin Lin; Siliang Tang; Jun Zhou; Shuang Yang; Yuan Qi; Xiang Ren Gradient-based adversarial attacks on categorical sequence models via traversing an embedded world.Ivan Fursov; Alexey Zaytsev; Nikita Kluchnikov; Andrey Kravchenko; Evgeny Burnaev 2020-03-08 Security of Distributed Machine Learning: A Game-Theoretic Approach to Design Secure DSVM.Rui Zhang; Quanyan Zhu An Empirical Evaluation on Robustness and Uncertainty of Regularization Methods.Sanghyuk Chun; Seong Joon Oh; Sangdoo Yun; Dongyoon Han; Junsuk Choe; Youngjoon Yoo On the Robustness of Cooperative Multi-Agent Reinforcement Learning.Jieyu Lin; Kristina Dzeparoska; Sai Qian Zhang; Alberto Leon-Garcia; Nicolas Papernot Adversarial Attacks on Probabilistic Autoregressive Forecasting Models.Raphaël Dang-Nhu; Gagandeep Singh; Pavol Bielik; Martin Vechev Adversarial Camouflage: Hiding Physical-World Attacks with Natural Styles.Ranjie Duan; Xingjun Ma; Yisen Wang; James Bailey; A. K. Qin; Yun Yang No Surprises: Training Robust Lung Nodule Detection for Low-Dose CT Scans by Augmenting with Adversarial Attacks.Siqi Liu; Arnaud Arindra Adiyoso Setio; Florin C. Ghesu; Eli Gibson; Sasa Grbic; Bogdan Georgescu; Dorin Comaniciu 2020-03-07 Dynamic Backdoor Attacks Against Machine Learning Models.Ahmed Salem; Rui Wen; Michael Backes; Shiqing Ma; Yang Zhang 2020-03-06 Triple Memory Networks: a Brain-Inspired Method for Continual Learning.Liyuan Wang; Bo Lei; Qian Li; Hang Su; Jun Zhu; Yi Zhong Defense against adversarial attacks on spoofing countermeasures of ASV.Haibin Wu; Songxiang Liu; Helen Meng; Hung-yi Lee Automatic Generation of Adversarial Examples for Interpreting Malware Classifiers.Wei Song; Xuezixiang Li; Sadia Afroz; Deepali Garg; Dmitry Kuznetsov; Heng Yin 2020-03-05 Towards Practical Lottery Ticket Hypothesis for Adversarial Training.Bai Li; Shiqi Wang; Yunhan Jia; Yantao Lu; Zhenyu Zhong; Lawrence Carin; Suman Jana Exploiting Verified Neural Networks via Floating Point Numerical Error.Kai Jia; Martin Rinard Detection and Recovery of Adversarial Attacks with Injected Attractors.Jiyi Zhang; Ee-Chien Chang; Hwee Kuan Lee Adversarial Robustness Through Local Lipschitzness.Yao-Yuan Yang; Cyrus Rashtchian; Hongyang Zhang; Ruslan Salakhutdinov; Kamalika Chaudhuri Adversarial Vertex Mixup: Toward Better Adversarially Robust Generalization.Saehyung Lee; Hyungyu Lee; Sungroh Yoon Search Space of Adversarial Perturbations against Image Filters.Dang Duy Thang; Toshihiro Matsui 2020-03-04 Real-time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems.Yi Xie; Cong Shi; Zhuohang Li; Jian Liu; Yingying Chen; Bo Yuan Colored Noise Injection for Training Adversarially Robust Neural Networks.Evgenii Zheltonozhskii; Chaim Baskin; Yaniv Nemcovsky; Brian Chmiel; Avi Mendelson; Alex M. Bronstein Double Backpropagation for Training Autoencoders against Adversarial Attack.Chengjin Sun; Sizhe Chen; Xiaolin Huang Black-box Smoothing: A Provable Defense for Pretrained Classifiers.Hadi Salman; Mingjie Sun; Greg Yang; Ashish Kapoor; J. Zico Kolter Metrics and methods for robustness evaluation of neural networks with generative models.Igor Buzhinsky; Arseny Nerinovsky; Stavros Tripakis 2020-03-03 Discriminative Multi-level Reconstruction under Compact Latent Space for One-Class Novelty Detection.Jaewoo Park; Yoon Gyo Jung; Andrew Beng Jin Teoh Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks.Francesco Croce; Matthias Hein Analyzing Accuracy Loss in Randomized Smoothing Defenses.Yue Gao; Harrison Rosenberg; Kassem Fawaz; Somesh Jha; Justin Hsu Security of Deep Learning based Lane Keeping System under Physical-World Adversarial Attack.Takami Sato; Junjie Shen; Ningfei Wang; Yunhan Jack Jia; Xue Lin; Qi Alfred Chen Type I Attack for Generative Models.Chengjin Sun; Sizhe Chen; Jia Cai; Xiaolin Huang 2020-03-02 Data-Free Adversarial Perturbations for Practical Black-Box Attack.ZhaoXin Huan; Yulong Wang; Xiaolu Zhang; Lin Shang; Chilin Fu; Jun Zhou Learn2Perturb: an End-to-end Feature Perturbation Learning to Improve Adversarial Robustness.Ahmadreza Jeddi; Mohammad Javad Shafiee; Michelle Karg; Christian Scharfenberger; Alexander Wong Disrupting Deepfakes: Adversarial Attacks Against Conditional Image Translation Networks and Facial Manipulation Systems.Nataniel Ruiz; Sarah Adel Bargal; Stan Sclaroff Hidden Cost of Randomized Smoothing.Jeet Lily Mohapatra; Ching-Yun Lily Ko; Lily Tsui-Wei; Weng; Sijia Liu; Pin-Yu Chen; Luca Daniel Adversarial Network Traffic: Towards Evaluating the Robustness of Deep Learning-Based Network Traffic Classification.Amir Mahdi Sadeghzadeh; Saeed Shiravi; Rasool Jalili 2020-03-01 Adversarial Attacks and Defenses on Graphs: A Review, A Tool and Empirical Studies.Wei Jin; Yaxin Li; Han Xu; Yiqi Wang; Shuiwang Ji; Charu Aggarwal; Jiliang Tang 2020-02-29 Understanding the Intrinsic Robustness of Image Distributions using Conditional Generative Models.Xiao Zhang; Jinghui Chen; Quanquan Gu; David Evans Why is the Mahalanobis Distance Effective for Anomaly Detection?Ryo Kamoi; Kei Kobayashi 2020-02-28 End-to-end Robustness for Sensing-Reasoning Machine Learning Pipelines.Zhuolin Yang; Zhikuan Zhao; Hengzhi Pei; Boxin Wang; Bojan Karlas; Ji Liu; Heng Guo; Bo Li; Ce Zhang Applying Tensor Decomposition to image for Robustness against Adversarial Attack.Seungju Cho; Tae Joon Jun; Mingu Kang; Daeyoung Kim 2020-02-27 Adv-BERT: BERT is not robust on misspellings! Generating nature adversarial samples on BERT.Lichao Sun; Kazuma Hashimoto; Wenpeng Yin; Akari Asai; Jia Li; Philip Yu; Caiming Xiong Detecting Patch Adversarial Attacks with Image Residuals.Marius Arvinte; Ahmed Tewfik; Sriram Vishwanath Certified Defense to Image Transformations via Randomized Smoothing.Marc Fischer; Maximilian Baader; Martin Vechev Are L2 adversarial examples intrinsically different?Mingxuan Li; Jingyuan Wang; Yufan Wu Provable Robust Learning Based on Transformation-Specific Smoothing.Linyi Li; Maurice Weber; Xiaojun Xu; Luka Rimanic; Tao Xie; Ce Zhang; Bo Li Utilizing Network Properties to Detect Erroneous Inputs.Matt Gorbett; Nathaniel Blanchard On Isometry Robustness of Deep 3D Point Cloud Models under Adversarial Attacks.Yue Zhao; Yuwei Wu; Caihua Chen; Andrew Lim FMix: Enhancing Mixed Sample Data Augmentation. (22%)Ethan Harris; Antonia Marcu; Matthew Painter; Mahesan Niranjan; Adam Prügel-Bennett; Jonathon Hare 2020-02-26 Revisiting Ensembles in an Adversarial Context: Improving Natural Accuracy.Aditya Saligrama; Guillaume Leclerc Invariance vs. Robustness of Neural Networks.Sandesh Kamath; Amit Deshpande; K V Subrahmanyam Overfitting in adversarially robust deep learning.Leslie Rice; Eric Wong; J. Zico Kolter MGA: Momentum Gradient Attack on Network.Jinyin Chen; Yixian Chen; Haibin Zheng; Shijing Shen; Shanqing Yu; Dan Zhang; Qi Xuan Improving Robustness of Deep-Learning-Based Image Reconstruction.Ankit Raj; Yoram Bresler; Bo Li Defense-PointNet: Protecting PointNet Against Adversarial Attacks.Yu Zhang; Gongbo Liang; Tawfiq Salem; Nathan Jacobs Adversarial Attack on Deep Product Quantization Network for Image Retrieval.Yan Feng; Bin Chen; Tao Dai; Shutao Xia Randomization matters. How to defend against strong adversarial attacks.Rafael Pinot; Raphael Ettedgui; Geovani Rizk; Yann Chevaleyre; Jamal Atif Learning Adversarially Robust Representations via Worst-Case Mutual Information Maximization.Sicheng Zhu; Xiao Zhang; David Evans 2020-02-25 Understanding and Mitigating the Tradeoff Between Robustness and Accuracy.Aditi Raghunathan; Sang Michael Xie; Fanny Yang; John Duchi; Percy Liang The Curious Case of Adversarially Robust Models: More Data Can Help, Double Descend, or Hurt Generalization.Yifei Min; Lin Chen; Amin Karbasi G\"odel's Sentence Is An Adversarial Example But Unsolvable.Xiaodong Qi; Lansheng Han Towards an Efficient and General Framework of Robust Training for Graph Neural Networks.Kaidi Xu; Sijia Liu; Pin-Yu Chen; Mengshu Sun; Caiwen Ding; Bhavya Kailkhura; Xue Lin (De)Randomized Smoothing for Certifiable Defense against Patch Attacks.Alexander Levine; Soheil Feizi Attacks Which Do Not Kill Training Make Adversarial Learning Stronger.Jingfeng Zhang; Xilie Xu; Bo Han; Gang Niu; Lizhen Cui; Masashi Sugiyama; Mohan Kankanhalli Adversarial Ranking Attack and Defense.Mo Zhou; Zhenxing Niu; Le Wang; Qilin Zhang; Gang Hua 2020-02-24 A Model-Based Derivative-Free Approach to Black-Box Adversarial Examples: BOBYQA.Giuseppe Ughi; Vinayak Abrol; Jared Tanner Utilizing a null class to restrict decision spaces and defend against neural network adversarial attacks.Matthew J. Roos Adversarial Perturbations Prevail in the Y-Channel of the YCbCr Color Space.Camilo Pestana; Naveed Akhtar; Wei Liu; David Glance; Ajmal Mian Towards Rapid and Robust Adversarial Training with One-Step Attacks.Leo Schwinn; René Raab; Björn Eskofier Precise Tradeoffs in Adversarial Training for Linear Regression.Adel Javanmard; Mahdi Soltanolkotabi; Hamed Hassani HYDRA: Pruning Adversarially Robust Neural Networks.Vikash Sehwag; Shiqi Wang; Prateek Mittal; Suman Jana 2020-02-23 Adversarial Attack on DL-based Massive MIMO CSI Feedback.Qing Liu; Jiajia Guo; Chao-Kai Wen; Shi Jin Triple Wins: Boosting Accuracy, Robustness and Efficiency Together by Enabling Input-Adaptive Inference.Ting-Kuei Hu; Tianlong Chen; Haotao Wang; Zhangyang Wang 2020-02-22 VisionGuard: Runtime Detection of Adversarial Inputs to Perception Systems.Yiannis Kantaros; Taylor Carpenter; Sangdon Park; Radoslav Ivanov; Sooyong Jang; Insup Lee; James Weimer Non-Intrusive Detection of Adversarial Deep Learning Attacks via Observer Networks.Kirthi Shankar Sivamani; Rajeev Sahay; Aly El Gamal Temporal Sparse Adversarial Attack on Sequence-based Gait Recognition.Ziwen He; Wei Wang; Jing Dong; Tieniu Tan Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples.Guanxiong Liu; Issa Khalil; Abdallah Khreishah 2020-02-21 Polarizing Front Ends for Robust CNNs.Can Bakiskan; Soorya Gopalakrishnan; Metehan Cekic; Upamanyu Madhow; Ramtin Pedarsani Robustness from Simple Classifiers.Sharon Qian; Dimitris Kalimeris; Gal Kaplun; Yaron Singer Adversarial Detection and Correction by Matching Prediction Distributions.Giovanni Vacanti; Looveren Arnaud Van UnMask: Adversarial Detection and Defense Through Robust Feature Alignment.Scott Freitas; Shang-Tse Chen; Zijie J. Wang; Duen Horng Chau Robustness to Programmable String Transformations via Augmented Abstract Training.Yuhao Zhang; Aws Albarghouthi; Loris D'Antoni Black-Box Certification with Randomized Smoothing: A Functional Optimization Based Framework.Dinghuai Zhang; Mao Ye; Chengyue Gong; Zhanxing Zhu; Qiang Liu Adversarial Attacks on Machine Learning Systems for High-Frequency Trading.Micah Goldblum; Avi Schwarzschild; Ankit B. Patel; Tom Goldstein 2020-02-20 Enhanced Adversarial Strategically-Timed Attacks against Deep Reinforcement Learning.Chao-Han Huck Yang; Jun Qi; Pin-Yu Chen; Yi Ouyang; I-Te Danny Hung; Chin-Hui Lee; Xiaoli Ma On the Decision Boundaries of Deep Neural Networks: A Tropical Geometry Perspective.Motasem Alfarra; Adel Bibi; Hasan Hammoud; Mohamed Gaafar; Bernard Ghanem A Bayes-Optimal View on Adversarial Examples.Eitan Richardson; Yair Weiss Towards Certifiable Adversarial Sample Detection.Ilia Shumailov; Yiren Zhao; Robert Mullins; Ross Anderson Boosting Adversarial Training with Hypersphere Embedding.Tianyu Pang; Xiao Yang; Yinpeng Dong; Kun Xu; Hang Su; Jun Zhu 2020-02-19 Bayes-TrEx: Model Transparency by Example.Serena Booth; Yilun Zhou; Ankit Shah; Julie Shah AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks.Xiao Wang; Siyue Wang; Pin-Yu Chen; Xue Lin; Peter Chin NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion.Aritran Piplai; Sai Sree Laya Chukkapalli; Anupam Joshi On Adaptive Attacks to Adversarial Example Defenses.Florian Tramer; Nicholas Carlini; Wieland Brendel; Aleksander Madry Indirect Adversarial Attacks via Poisoning Neighbors for Graph Convolutional Networks.Tsubasa Takahashi Randomized Smoothing of All Shapes and Sizes.Greg Yang; Tony Duan; J. Edward Hu; Hadi Salman; Ilya Razenshteyn; Jerry Li 2020-02-18 Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense.Guanlin Liu; Lifeng lai Deflecting Adversarial Attacks.Yao Qin; Nicholas Frosst; Colin Raffel; Garrison Cottrell; Geoffrey Hinton Block Switching: A Stochastic Approach for Deep Learning Security.Xiao Wang; Siyue Wang; Pin-Yu Chen; Xue Lin; Peter Chin Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent.Pu Zhao; Pin-Yu Chen; Siyue Wang; Xue Lin 2020-02-17 TensorShield: Tensor-based Defense Against Adversarial Attacks on Images.Negin Entezari; Evangelos E. Papalexakis On the Similarity of Deep Learning Representations Across Didactic and Adversarial Examples.Pamela K. Douglas; Farzad Vasheghani Farahani Query-Efficient Physical Hard-Label Attacks on Deep Learning Visual Classification.Ryan Feng; Jiefeng Chen; Nelson Manohar; Earlence Fernandes; Somesh Jha; Atul Prakash Scalable Quantitative Verification For Deep Neural Networks.Teodora Baluta; Zheng Leong Chua; Kuldeep S. Meel; Prateek Saxena CAT: Customized Adversarial Training for Improved Robustness.Minhao Cheng; Qi Lei; Pin-Yu Chen; Inderjit Dhillon; Cho-Jui Hsieh On the Matrix-Free Generation of Adversarial Perturbations for Black-Box Attacks.Hisaichi Shibata; Shouhei Hanaoka; Yukihiro Nomura; Naoto Hayashi; Osamu Abe Robust Stochastic Bandit Algorithms under Probabilistic Unbounded Adversarial Attack.Ziwei Guan; Kaiyi Ji; Donald J Jr Bucci; Timothy Y Hu; Joseph Palombo; Michael Liston; Yingbin Liang Regularized Training and Tight Certification for Randomized Smoothed Classifier with Provable Robustness.Huijie Feng; Chunpeng Wu; Guoyang Chen; Weifeng Zhang; Yang Ning 2020-02-16 Over-parameterized Adversarial Training: An Analysis Overcoming the Curse of Dimensionality.Yi Zhang; Orestis Plevrakis; Simon S. Du; Xingguo Li; Zhao Song; Sanjeev Arora 2020-02-15 Undersensitivity in Neural Reading Comprehension.Johannes Welbl; Pasquale Minervini; Max Bartolo; Pontus Stenetorp; Sebastian Riedel Hold me tight! Influence of discriminative features on deep network boundaries.Guillermo Ortiz-Jimenez; Apostolos Modas; Seyed-Mohsen Moosavi-Dezfooli; Pascal Frossard Blind Adversarial Network Perturbations.Milad Nasr; Alireza Bahramali; Amir Houmansadr 2020-02-14 Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets.Dongxian Wu; Yisen Wang; Shu-Tao Xia; James Bailey; Xingjun Ma Adversarial Distributional Training for Robust Deep Learning.Yinpeng Dong; Zhijie Deng; Tianyu Pang; Hang Su; Jun Zhu 2020-02-13 Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks.Taro Kiritani; Koji Ono The Conditional Entropy Bottleneck.Ian Fischer Identifying Audio Adversarial Examples via Anomalous Pattern Detection.Victor Akinwande; Celia Cintas; Skyler Speakman; Srihari Sridharan 2020-02-12 Stabilizing Differentiable Architecture Search via Perturbation-based Regularization.Xiangning Chen; Cho-Jui Hsieh Flickering Adversarial Attacks against Video Recognition Networks.Itay Naeh; Roi Pony; Shie Mannor 2020-02-11 Adversarial Robustness for Code.Pavol Bielik; Martin Vechev Graph Universal Adversarial Attacks: A Few Bad Actors Ruin Graph Learning Models.Xiao Zang; Yi Xie; Jie Chen; Bo Yuan Fundamental Tradeoffs between Invariance and Sensitivity to Adversarial Perturbations.Florian Tramèr; Jens Behrmann; Nicholas Carlini; Nicolas Papernot; Jörn-Henrik Jacobsen Robustness of Bayesian Neural Networks to Gradient-Based Attacks.Ginevra Carbone; Matthew Wicker; Luca Laurenti; Andrea Patane; Luca Bortolussi; Guido Sanguinetti Improving the affordability of robustness training for DNNs.Sidharth Gupta; Parijat Dube; Ashish Verma Fast Geometric Projections for Local Robustness Certification.Aymeric Fromherz; Klas Leino; Matt Fredrikson; Bryan Parno; Corina Păsăreanu More Data Can Expand the Generalization Gap Between Adversarially Robust and Standard Models.Lin Chen; Yifei Min; Mingrui Zhang; Amin Karbasi 2020-02-10 Playing to Learn Better: Repeated Games for Adversarial Learning with Multiple Classifiers.Prithviraj Dasgupta; Joseph B. Collins; Michael McCarrick Adversarial Data Encryption.Yingdong Hu; Liang Zhang; Wei Shan; Xiaoxiao Qin; Jing Qi; Zhenzhou Wu; Yang Yuan Generalised Lipschitz Regularisation Equals Distributional Robustness.Zac Cranko; Zhan Shi; Xinhua Zhang; Richard Nock; Simon Kornblith 2020-02-09 MDEA: Malware Detection with Evolutionary Adversarial Learning.Xiruo Wang; Risto Miikkulainen Input Validation for Neural Networks via Runtime Local Robustness Verification.Jiangchao Liu; Liqian Chen; Antoine Mine; Ji Wang Robust binary classification with the 01 loss.Yunzhe Xue; Meiyan Xie; Usman Roshan Watch out! Motion is Blurring the Vision of Your Deep Neural Networks.Qing Guo; Felix Juefei-Xu; Xiaofei Xie; Lei Ma; Jian Wang; Bing Yu; Wei Feng; Yang Liu Feature-level Malware Obfuscation in Deep Learning.Keith Dillon Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples.Paarth Neekhara; Shehzeen Hussain; Malhar Jere; Farinaz Koushanfar; Julian McAuley Category-wise Attack: Transferable Adversarial Examples for Anchor Free Object Detection.Quanyu Liao; Xin Wang; Bin Kong; Siwei Lyu; Youbing Yin; Qi Song; Xi Wu Certified Robustness of Community Detection against Adversarial Structural Perturbation via Randomized Smoothing.Jinyuan Jia; Binghui Wang; Xiaoyu Cao; Neil Zhenqiang Gong Random Smoothing Might be Unable to Certify $\ell_\infty$ Robustness for High-Dimensional Images.Avrim Blum; Travis Dick; Naren Manoj; Hongyang Zhang 2020-02-08 Attacking Optical Character Recognition (OCR) Systems with Adversarial Watermarks.Lu Chen; Wei Xu Curse of Dimensionality on Randomized Smoothing for Certifiable Robustness.Aounon Kumar; Alexander Levine; Tom Goldstein; Soheil Feizi 2020-02-07 Improving the Adversarial Robustness of Transfer Learning via Noisy Feature Distillation.Ting-Wu Chin; Cha Zhang; Diana Marculescu Semantic Robustness of Models of Source Code.Goutham Ramakrishnan; Jordan Henkel; Zi Wang; Aws Albarghouthi; Somesh Jha; Thomas Reps Analysis of Random Perturbations for Robust Convolutional Neural Networks.Adam Dziedzic; Sanjay Krishnan RAID: Randomized Adversarial-Input Detection for Neural Networks.Hasan Ferit Eniser; Maria Christakis; Valentin Wüstholz Assessing the Adversarial Robustness of Monte Carlo and Distillation Methods for Deep Bayesian Neural Network Classification.Meet P. Vadera; Satya Narayan Shukla; Brian Jalaian; Benjamin M. Marlin 2020-02-06 Reliability Validation of Learning Enabled Vehicle Tracking.Youcheng Sun; Yifan Zhou; Simon Maskell; James Sharp; Xiaowei Huang An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models.Yao Deng; Xi Zheng; Tianyi Zhang; Chen Chen; Guannan Lou; Miryung Kim AI-GAN: Attack-Inspired Generation of Adversarial Examples.Tao Bai; Jun Zhao; Jinlin Zhu; Shoudong Han; Jiefeng Chen; Bo Li; Alex Kot 2020-02-05 Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels.Brian Kim; Yalin E. Sagduyu; Kemal Davaslioglu; Tugba Erpek; Sennur Ulukus Understanding the Decision Boundary of Deep Neural Networks: An Empirical Study.David Mickisch; Felix Assion; Florens Greßner; Wiebke Günther; Mariele Motta 2020-02-04 Adversarially Robust Frame Sampling with Bounded Irregularities.Hanhan Li; Pin Wang Adversarial Attacks to Scale-Free Networks: Testing the Robustness of Physical Criteria.Qi Xuan; Yalu Shan; Jinhuan Wang; Zhongyuan Ruan; Guanrong Chen Minimax Defense against Gradient-based Adversarial Attacks.Blerta Lindqvist; Rauf Izmailov 2020-02-03 A Differentiable Color Filter for Generating Unrestricted Adversarial Images.Zhengyu Zhao; Zhuoran Liu; Martha Larson Regularizers for Single-step Adversarial Training.B. S. Vivek; R. Venkatesh Babu Defending Adversarial Attacks via Semantic Feature Manipulation.Shuo Wang; Tianle Chen; Surya Nepal; Carsten Rudolph; Marthie Grobler; Shangyu Chen 2020-02-02 Robust saliency maps with decoy-enhanced saliency score.Yang Lu; Wenbo Guo; Xinyu Xing; William Stafford Noble 2020-02-01 Towards Sharper First-Order Adversary with Quantized Gradients.Zhuanghua Liu; Ivor W. Tsang AdvJND: Generating Adversarial Examples with Just Noticeable Difference.Zifei Zhang; Kai Qiao; Lingyun Jiang; Linyuan Wang; Bin Yan 2020-01-31 Additive Tree Ensembles: Reasoning About Potential Instances.Laurens Devos; Wannes Meert; Jesse Davis Politics of Adversarial Machine Learning.Kendra Albert; Jonathon Penney; Bruce Schneier; Ram Shankar Siva Kumar FastWordBug: A Fast Method To Generate Adversarial Text Against NLP Applications.Dou Goodman; Lv Zhonghou; Wang minghua 2020-01-30 Tiny Noise Can Make an EEG-Based Brain-Computer Interface Speller Output Anything.Xiao Zhang; Dongrui Wu; Lieyun Ding; Hanbin Luo; Chin-Teng Lin; Tzyy-Ping Jung; Ricardo Chavarriaga 2020-01-29 A4 : Evading Learning-based Adblockers.Shitong Zhu; Zhongjie Wang; Xun Chen; Shasha Li; Umar Iqbal; Zhiyun Qian; Kevin S. Chan; Srikanth V. Krishnamurthy; Zubair Shafiq D2M: Dynamic Defense and Modeling of Adversarial Movement in Networks.Scott Freitas; Andrew Wicker; Duen Horng Chau; Joshua Neil Just Noticeable Difference for Machines to Generate Adversarial Images.Adil Kaan Akan; Mehmet Ali Genc; Fatos T. Yarman Vural Semantic Adversarial Perturbations using Learnt Representations.Isaac Dunn; Tom Melham; Daniel Kroening Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain.Yigit Alparslan; Ken Alparslan; Jeremy Keim-Shenk; Shweta Khade; Rachel Greenstadt 2020-01-28 Modelling and Quantifying Membership Information Leakage in Machine Learning.Farhad Farokhi; Mohamed Ali Kaafar 2020-01-27 Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis.William Briguglio; Sherif Saad Generating Natural Adversarial Hyperspectral examples with a modified Wasserstein GAN.Jean-Christophe OBELIX Burnel; Kilian OBELIX Fatras; Nicolas OBELIX Courty FakeLocator: Robust Localization of GAN-Based Face Manipulations via Semantic Segmentation Networks with Bells and Whistles.Yihao Huang; Felix Juefei-Xu; Run Wang; Xiaofei Xie; Lei Ma; Jianwen Li; Weikai Miao; Yang Liu; Geguang Pu Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning.Inaam Ilahi; Muhammad Usama; Junaid Qadir; Muhammad Umar Janjua; Ala Al-Fuqaha; Dinh Thai Hoang; Dusit Niyato Practical Fast Gradient Sign Attack against Mammographic Image Classifier.Ibrahim Yilmaz 2020-01-26 Ensemble Noise Simulation to Handle Uncertainty about Gradient-based Adversarial Attacks.Rehana Mahfuz; Rajeev Sahay; Aly El Gamal 2020-01-25 Weighted Average Precision: Adversarial Example Detection in the Visual Perception of Autonomous Vehicles.Yilan Li; Senem Velipasalar AI-Powered GUI Attack and Its Defensive Methods.Ning Yu; Zachary Tuttle; Carl Jake Thurnau; Emmanuel Mireku Analyzing the Noise Robustness of Deep Neural Networks.Kelei Cao; Mengchen Liu; Hang Su; Jing Wu; Jun Zhu; Shixia Liu 2020-01-24 When Wireless Security Meets Machine Learning: Motivation, Challenges, and Research Directions.Yalin E. Sagduyu; Yi Shi; Tugba Erpek; William Headley; Bryse Flowers; George Stantchev; Zhuo Lu 2020-01-23 Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack.Bo Zhang; Ruotong Yu; Haipei Sun; Yanying Li; Jun Xu; Hui Wang Towards Robust DNNs: An Taylor Expansion-Based Method for Generating Powerful Adversarial Examples.Ya-guan Qian; Xi-Ming Zhang; Bin Wang; Wei Li; Jian-Hai Chen; Wu-Jie Zhou; Jing-Sheng Lei On the human evaluation of audio adversarial examples.Jon Vadillo; Roberto Santana 2020-01-22 Adversarial Attack on Community Detection by Hiding Individuals.Jia Li; Honglei Zhang; Zhichao Han; Yu Rong; Hong Cheng; Junzhou Huang 2020-01-21 SAUNet: Shape Attentive U-Net for Interpretable Medical Image Segmentation.Jesse Sun; Fatemeh Darbeha; Mark Zaidi; Bo Wang Secure and Robust Machine Learning for Healthcare: A Survey.Adnan Qayyum; Junaid Qadir; Muhammad Bilal; Ala Al-Fuqaha FixMatch: Simplifying Semi-Supervised Learning with Consistency and Confidence.Kihyuk Sohn; David Berthelot; Chun-Liang Li; Zizhao Zhang; Nicholas Carlini; Ekin D. Cubuk; Alex Kurakin; Han Zhang; Colin Raffel GhostImage: Perception Domain Attacks against Vision-based Object Classification Systems.Yanmao Man; Ming Li; Ryan Gerdes Generate High-Resolution Adversarial Samples by Identifying Effective Features.Sizhe Chen; Peidong Zhang; Chengjin Sun; Jia Cai; Xiaolin Huang Massif: Interactive Interpretation of Adversarial Attacks on Deep Learning.Nilaksh Polo Das; Haekyu Polo Park; Zijie J. Polo Wang; Fred Polo Hohman; Robert Polo Firstman; Emily Polo Rogers; Duen Polo Horng; Chau Elephant in the Room: An Evaluation Framework for Assessing Adversarial Examples in NLP.Ying Xu; Xu Zhong; Antonio Jose Jimeno Yepes; Jey Han Lau 2020-01-17 Cyber Attack Detection thanks to Machine Learning Algorithms.Antoine Delplace; Sheryl Hermoso; Kristofer Anandita 2020-01-16 Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks.Farnaz Behnia; Ali Mirzaeian; Mohammad Sabokrou; Sai Manoj; Tinoosh Mohsenin; Khaled N. Khasawneh; Liang Zhao; Houman Homayoun; Avesta Sasan A Little Fog for a Large Turn.Harshitha Machiraju; Vineeth N Balasubramanian The gap between theory and practice in function approximation with deep neural networks.Ben Adcock; Nick Dexter Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet.Sizhe Chen; Zhengbao He; Chengjin Sun; Jie Yang; Xiaolin Huang Increasing the robustness of DNNs against image corruptions by playing the Game of Noise.Evgenia Rusak; Lukas Schott; Roland S. Zimmermann; Julian Bitterwolf; Oliver Bringmann; Matthias Bethge; Wieland Brendel 2020-01-14 Noisy Machines: Understanding Noisy Neural Networks and Enhancing Robustness to Analog Hardware Errors Using Distillation.Chuteng Zhou; Prad Kadambi; Matthew Mattina; Paul N. Whatmough 2020-01-13 Advbox: a toolbox to generate adversarial examples that fool neural networks.Dou Goodman; Hao Xin; Wang Yang; Wu Yuesheng; Xiong Junfeng; Zhang Huan 2020-01-12 Membership Inference Attacks Against Object Detection Models.Yeachan Park; Myungjoo Kang An Adversarial Approach for the Robust Classification of Pneumonia from Chest Radiographs.Joseph D. Janizek; Gabriel Erion; Alex J. DeGrave; Su-In Lee Fast is better than free: Revisiting adversarial training.Eric Wong; Leslie Rice; J. Zico Kolter 2020-01-11 Exploring and Improving Robustness of Multi Task Deep Neural Networks via Domain Agnostic Defenses.Kashyap Coimbatore Murali Sparse Black-box Video Attack with Reinforcement Learning.Huanqian Yan; Xingxing Wei; Bo Li 2020-01-10 ReluDiff: Differential Verification of Deep Neural Networks.Brandon Paulsen; Jingbo Wang; Chao Wang Guess First to Enable Better Compression and Adversarial Robustness.Sicheng Zhu; Bang An; Shiyu Niu 2020-01-08 To Transfer or Not to Transfer: Misclassification Attacks Against Transfer Learned Text Classifiers.Bijeeta Pal; Shruti Tople MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius.Runtian Zhai; Chen Dan; Di He; Huan Zhang; Boqing Gong; Pradeep Ravikumar; Cho-Jui Hsieh; Liwei Wang Transferability of Adversarial Examples to Attack Cloud-based Image Classifier Service.Dou Goodman 2020-01-07 Softmax-based Classification is k-means Clustering: Formal Proof, Consequences for Adversarial Attacks, and Improvement through Centroid Based Tailoring.Sibylle Hess; Wouter Duivesteijn; Decebal Mocanu 2020-01-06 Generating Semantic Adversarial Examples via Feature Manipulation.Shuo Wang; Shangyu Chen; Tianle Chen; Surya Nepal; Carsten Rudolph; Marthie Grobler Deceiving Image-to-Image Translation Networks for Autonomous Driving with Adversarial Perturbations.Lin Wang; Wonjune Cho; Kuk-Jin Yoon 2020-01-05 The Human Visual System and Adversarial AI.Yaoshiang Ho; Samuel Wookey 2020-01-02 Reject Illegal Inputs with Generative Classifier Derived from Any Discriminative Classifier.Xin Wang 2020-01-01 Exploring Adversarial Attack in Spiking Neural Networks with Spike-Compatible Gradient.Ling Liang; Xing Hu; Lei Deng; Yujie Wu; Guoqi Li; Yufei Ding; Peng Li; Yuan Xie Ensembles of Many Diverse Weak Defenses can be Strong: Defending Deep Neural Networks Against Adversarial Attacks.Ying Meng; Jianhai Su; Jason O'Kane; Pooyan Jamshidi 2019-12-31 Automated Testing for Deep Learning Systems with Differential Behavior Criteria.Yuan Gao; Yiqiang Han Protecting GANs against privacy attacks by preventing overfitting.Sumit Mukherjee; Yixi Xu; Anusua Trivedi; Juan Lavista Ferres Erase and Restore: Simple, Accurate and Resilient Detection of $L_2$ Adversarial Examples.Fei Zuo; Qiang Zeng Quantum Adversarial Machine Learning.Sirui Lu; Lu-Ming Duan; Dong-Ling Deng 2019-12-30 Adversarial Example Generation using Evolutionary Multi-objective Optimization.Takahiro Suzuki; Shingo Takeshita; Satoshi Ono Defending from adversarial examples with a two-stream architecture.Hao Ge; Xiaoguang Tu; Mei Xie; Zheng Ma 2019-12-28 Detecting Out-of-Distribution Examples with In-distribution Examples and Gram Matrices.Chandramouli Shama Sastry; Sageev Oore Search Based Repair of Deep Neural Networks.Jeongju Sohn; Sungmin Kang; Shin Yoo 2019-12-26 Benchmarking Adversarial Robustness.Yinpeng Dong; Qi-An Fu; Xiao Yang; Tianyu Pang; Hang Su; Zihao Xiao; Jun Zhu Efficient Adversarial Training with Transferable Adversarial Examples.Haizhong Zheng; Ziqi Zhang; Juncheng Gu; Honglak Lee; Atul Prakash 2019-12-24 Attack-Resistant Federated Learning with Residual-based Reweighting.Shuhao Fu; Chulin Xie; Bo Li; Qifeng Chen Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid.Zhenyong Zhang; Ruilong Deng; Member; IEEE; David K. Y. Yau; Senior Member; IEEE; Peng Cheng; Member; IEEE; Jiming Chen; Fellow; IEEE Cronus: Robust and Heterogeneous Collaborative Learning with Black-Box Knowledge Transfer.Hongyan Chang; Virat Shejwalkar; Reza Shokri; Amir Houmansadr Characterizing the Decision Boundary of Deep Neural Networks.Hamid Karimi; Tyler Derr; Jiliang Tang 2019-12-23 White Noise Analysis of Neural Networks.Ali Borji; Sikun Lin Adversarial AutoAugment.Xinyu Zhang; Qiang Wang; Jian Zhang; Zhao Zhong Geometry-aware Generation of Adversarial and Cooperative Point Clouds.Yuxin Wen; Jiehong Lin; Ke Chen; Kui Jia 2019-12-21 T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted Attack.Boxin Wang; Hengzhi Pei; Boyuan Pan; Qian Chen; Shuohang Wang; Bo Li 2019-12-20 Measuring Dataset Granularity.Yin Cui; Zeqi Gu; Dhruv Mahajan; der Maaten Laurens van; Serge Belongie; Ser-Nam Lim Certified Robustness for Top-k Predictions against Adversarial Perturbations via Randomized Smoothing.Jinyuan Jia; Xiaoyu Cao; Binghui Wang; Neil Zhenqiang Gong secml: A Python Library for Secure and Explainable Machine Learning.Marco Melis; Ambra Demontis; Maura Pintor; Angelo Sotgiu; Battista Biggio Jacobian Adversarially Regularized Networks for Robustness.Alvin Chan; Yi Tay; Yew Soon Ong; Jie Fu Explainability and Adversarial Robustness for RNNs.Alexander Hartl; Maximilian Bachl; Joachim Fabini; Tanja Zseby Adversarial symmetric GANs: bridging adversarial samples and adversarial networks.Faqiang Liu; Mingkun Xu; Guoqi Li; Jing Pei; Luping Shi; Rong Zhao 2019-12-19 Does Symbolic Knowledge Prevent Adversarial Fooling?Stefano Teso A New Ensemble Method for Concessively Targeted Multi-model Attack.Ziwen He; Wei Wang; Xinsheng Xuan; Jing Dong; Tieniu Tan Mitigating large adversarial perturbations on X-MAS (X minus Moving Averaged Samples).Woohyung Chun; Sung-Min Hong; Junho Huh; Inyup Kang Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection.Mahmood Sharif; Keane Lucas; Lujo Bauer; Michael K. Reiter; Saurabh Shintre $n$-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers.Mahmood Sharif; Lujo Bauer; Michael K. Reiter Towards Verifying Robustness of Neural Networks Against Semantic Perturbations.Jeet Lily Mohapatra; Lily Tsui-Wei; Weng; Pin-Yu Chen; Sijia Liu; Luca Daniel Perturbations on the Perceptual Ball.Andrew Elliott; Stephen Law; Chris Russell 2019-12-18 Identifying Adversarial Sentences by Analyzing Text Complexity.Hoang-Quoc Nguyen-Son; Tran Phuong Thao; Seira Hidano; Shinsaku Kiyomoto An Adversarial Perturbation Oriented Domain Adaptation Approach for Semantic Segmentation.Jihan Yang; Ruijia Xu; Ruiyu Li; Xiaojuan Qi; Xiaoyong Shen; Guanbin Li; Liang Lin Adversarial VC-dimension and Sample Complexity of Neural Networks.Zetong Qi; T. J. Wilder SIGMA : Strengthening IDS with GAN and Metaheuristics Attacks.Simon Msika; Alejandro Quintero; Foutse Khomh Detecting Adversarial Attacks On Audio-Visual Speech Recognition.Pingchuan Ma; Stavros Petridis; Maja Pantic 2019-12-17 APRICOT: A Dataset of Physical Adversarial Attacks on Object Detection.A. Braunegg; Amartya Chakraborty; Michael Krumdick; Nicole Lape; Sara Leary; Keith Manville; Elizabeth Merkhofer; Laura Strickhart; Matthew Walmer 2019-12-16 CAG: A Real-time Low-cost Enhanced-robustness High-transferability Content-aware Adversarial Attack Generator.Huy Phan; Yi Xie; Siyu Liao; Jie Chen; Bo Yuan MimicGAN: Robust Projection onto Image Manifolds with Corruption Mimicking.Rushil Anirudh; Jayaraman J. Thiagarajan; Bhavya Kailkhura; Timo Bremer On-manifold Adversarial Data Augmentation Improves Uncertainty Calibration.Kanil Patel; William Beluch; Dan Zhang; Michael Pfeiffer; Bin Yang Constructing a provably adversarially-robust classifier from a high accuracy one.Grzegorz Głuch; Rüdiger Urbanke 2019-12-15 DAmageNet: A Universal Adversarial Dataset.Sizhe Chen; Xiaolin Huang; Zhengbao He; Chengjin Sun 2019-12-14 What Else Can Fool Deep Learning? Addressing Color Constancy Errors on Deep Neural Network Performance.Mahmoud Afifi; Michael S Brown Towards Robust Toxic Content Classification.Keita Kurita; Anna Belova; Antonios Anastasopoulos 2019-12-13 Potential adversarial samples for white-box attacks.Amir Nazemi; Paul Fieguth 2019-12-11 Learning to Model Aspects of Hearing Perception Using Neural Loss Functions.Prateek Verma; Jonathan Berger Gabor Layers Enhance Network Robustness.Juan C. Pérez; Motasem Alfarra; Guillaume Jeanneret; Adel Bibi; Ali Thabet; Bernard Ghanem; Pablo Arbeláez An Efficient Approach for Using Expectation Maximization Algorithm in Capsule Networks.Moein Hasani; Amin Nasim Saravi; Hassan Khotanlou Detecting and Correcting Adversarial Images Using Image Processing Operations and Convolutional Neural Networks.Huy H. Nguyen; Minoru Kuribayashi; Junichi Yamagishi; Isao Echizen What it Thinks is Important is Important: Robustness Transfers through Input Gradients.Alvin Chan; Yi Tay; Yew-Soon Ong 2019-12-10 Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples.Behzad Asadi; Vijay Varadharajan Training Provably Robust Models by Polyhedral Envelope Regularization.Chen Liu; Mathieu Salzmann; Sabine Süsstrunk Appending Adversarial Frames for Universal Video Attack.Zhikai Chen; Lingxi Xie; Shanmin Pang; Yong He; Qi Tian 2019-12-09 Feature Losses for Adversarial Robustness.Kirthi Shankar Sivamani 2019-12-08 Hardening Random Forest Cyber Detectors Against Adversarial Attacks.Giovanni Apruzzese; Mauro Andreolini; Michele Colajanni; Mirco Marchetti Amora: Black-box Adversarial Morphing Attack.Run Wang; Felix Juefei-Xu; Xiaofei Xie; Lei Ma; Yihao Huang; Yang Liu 2019-12-07 Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks.Yi Xiang Marcus Tan; Yuval Elovici; Alexander Binder 2019-12-06 Achieving Robustness in the Wild via Adversarial Mixing with Disentangled Representations.Sven Gowal; Chongli Qin; Po-Sen Huang; Taylan Cemgil; Krishnamurthy Dvijotham; Timothy Mann; Pushmeet Kohli Principal Component Properties of Adversarial Samples.Malhar Jere; Sandro Herbig; Christine Lind; Farinaz Koushanfar Training Deep Neural Networks for Interpretability and Adversarial Robustness.Adam Noack; Isaac Ahern; Dejing Dou; Boyang Li 2019-12-05 Detection of Face Recognition Adversarial Attacks.Fabio Valerio Massoli; Fabio Carrara; Giuseppe Amato; Fabrizio Falchi The Search for Sparse, Robust Neural Networks.Justin Cosentino; Federico Zaiter; Dan Pei; Jun Zhu Region-Wise Attack: On Efficient Generation of Robust Physical Adversarial Examples.Bo Luo; Qiang Xu 2019-12-04 Learning with Multiplicative Perturbations.Xiulong Yang; Shihao Ji A Survey of Game Theoretic Approaches for Adversarial Machine Learning in Cybersecurity Tasks.Prithviraj Dasgupta; Joseph B. Collins Walking on the Edge: Fast, Low-Distortion Adversarial Examples.Hanwei Zhang; Yannis Avrithis; Teddy Furon; Laurent Amsaleg Towards Robust Image Classification Using Sequential Attention Models.Daniel Zoran; Mike Chrzanowski; Po-Sen Huang; Sven Gowal; Alex Mott; Pushmeet Kohl Scratch that! An Evolution-based Adversarial Attack against Neural Networks.Malhar Jere; Briland Hitaj; Gabriela Ciocarlie; Farinaz Koushanfar 2019-12-03 A Survey of Black-Box Adversarial Attacks on Computer Vision Models.Siddhant Bhambri; Sumanyu Muku; Avinash Tulasi; Arun Balaji Buduru FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks.Mahum Naseer; Mishal Fatima Minhas; Faiq Khalid; Muhammad Abdullah Hanif; Osman Hasan; Muhammad Shafique 2019-12-02 Cost-Aware Robust Tree Ensembles for Security Applications.Yizheng Chen; Shiqi Wang; Weifan Jiang; Asaf Cidon; Suman Jana Deep Neural Network Fingerprinting by Conferrable Adversarial Examples.Nils Lukas; Yuxuan Zhang; Florian Kerschbaum Universal Adversarial Perturbations for CNN Classifiers in EEG-Based BCIs.Zihan Liu; Xiao Zhang; Lubin Meng; Dongrui Wu 2019-12-01 Adversary A3C for Robust Reinforcement Learning.Zhaoyuan Gu; Zhenzhong Jia; Howie Choset A Method for Computing Class-wise Universal Adversarial Perturbations.Tejus Gupta; Abhishek Sinha; Nupur Kumari; Mayank Singh; Balaji Krishnamurthy AdvPC: Transferable Adversarial Perturbations on 3D Point Clouds.Abdullah Hamdi; Sara Rojas; Ali Thabet; Bernard Ghanem 2019-11-30 Design and Interpretation of Universal Adversarial Patches in Face Detection.Xiao Yang; Fangyun Wei; Hongyang Zhang; Jun Zhu Error-Correcting Neural Network.Yang Song; Qiyu Kang; Wee Peng Tay 2019-11-29 Square Attack: a query-efficient black-box adversarial attack via random search.Maksym Andriushchenko; Francesco Croce; Nicolas Flammarion; Matthias Hein 2019-11-28 Towards Privacy and Security of Deep Learning Systems: A Survey.Yingzhe He; Guozhu Meng; Kai Chen; Xingbo Hu; Jinwen He 2019-11-26 Survey of Attacks and Defenses on Edge-Deployed Neural Networks.Mihailo Isakov; Vijay Gadepally; Karen M. Gettings; Michel A. Kinsy An Adaptive View of Adversarial Robustness from Test-time Smoothing Defense.Chao Tang; Yifei Fan; Anthony Yezzi Can Attention Masks Improve Adversarial Robustness?Pratik Vaishnavi; Tianji Cong; Kevin Eykholt; Atul Prakash; Amir Rahmati Defending Against Adversarial Machine Learning.Alison Jenkins Using Depth for Pixel-Wise Detection of Adversarial Attacks in Crowd Counting.Weizhe Liu; Mathieu Salzmann; Pascal Fua 2019-11-25 Playing it Safe: Adversarial Robustness with an Abstain Option.Cassidy Laidlaw; Soheil Feizi ColorFool: Semantic Adversarial Colorization.Ali Shahin Shamsabadi; Ricardo Sanchez-Matilla; Andrea Cavallaro Adversarial Attack with Pattern Replacement.Ziang Dong; Liang Mao; Shiliang Sun One Man's Trash is Another Man's Treasure: Resisting Adversarial Examples by Adversarial Examples.Chang Xiao; Changxi Zheng 2019-11-24 When NAS Meets Robustness: In Search of Robust Architectures against Adversarial Attacks.Minghao Guo; Yuzhe Yang; Rui Xu; Ziwei Liu; Dahua Lin Time-aware Gradient Attack on Dynamic Network Link Prediction.Jinyin Chen; Jian Zhang; Zhi Chen; Min Du; Feifei Li; Qi Xuan 2019-11-23 Universal Adversarial Perturbations to Understand Robustness of Texture vs. Shape-biased Training.Kenneth T. Co; Luis Muñoz-González; Leslie Kanthan; Ben Glocker; Emil C. Lupu Robust Assessment of Real-World Adversarial Examples.Brett Jefferson; Carlos Ortiz Marrero 2019-11-22 Bounding Singular Values of Convolution Layers.Sahil Singla; Soheil Feizi Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion Reduction.Yantao Lu; Yunhan Jia; Jianyu Wang; Bai Li; Weiheng Chai; Lawrence Carin; Senem Velipasalar Attack Agnostic Statistical Method for Adversarial Detection.Sambuddha Saha; Aashish Kumar; Pratyush Sahay; George Jose; Srinivas Kruthiventi; Harikrishna Muralidhara Universal adversarial examples in speech command classification.Jon Vadillo; Roberto Santana Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Networks for Secure Inference.Wei-An Lin; Yogesh Balaji; Pouya Samangouei; Rama Chellappa 2019-11-21 Heuristic Black-box Adversarial Attacks on Video Recognition Models.Zhipeng Wei; Jingjing Chen; Xingxing Wei; Linxi Jiang; Tat-Seng Chua; Fengfeng Zhou; Yu-Gang Jiang Adversarial Examples Improve Image Recognition.Cihang Xie; Mingxing Tan; Boqing Gong; Jiang Wang; Alan Yuille; Quoc V. Le 2019-11-20 Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation.Alexander Levine; Soheil Feizi Analysis of Deep Networks for Monocular Depth Estimation Through Adversarial Attacks with Proposal of a Defense Method.Junjie Hu; Takayuki Okatani Fine-grained Synthesis of Unrestricted Adversarial Examples.Omid Poursaeed; Tianxing Jiang; Harry Yang; Serge Belongie; Ser-Nam Lim Deep Minimax Probability Machine.Lirong He; Ziyi Guo; Kaizhu Huang; Zenglin Xu 2019-11-19 Logic-inspired Deep Neural Networks.Minh Le Where is the Bottleneck of Adversarial Learning with Unlabeled Data?Jingfeng Zhang; Bo Han; Gang Niu; Tongliang Liu; Masashi Sugiyama Adversarial Robustness of Flow-Based Generative Models.Phillip Pope; Yogesh Balaji; Soheil Feizi Defective Convolutional Layers Learn Robust CNNs.Tiange Luo; Tianle Cai; Mengxiao Zhang; Siyu Chen; Di He; Liwei Wang Generate (non-software) Bugs to Fool Classifiers.Hiromu Yakura; Youhei Akimoto; Jun Sakuma 2019-11-18 A New Ensemble Adversarial Attack Powered by Long-term Gradient Memories.Zhaohui Che; Ali Borji; Guangtao Zhai; Suiyi Ling; Jing Li; Patrick Le Callet A novel method for identifying the deep neural network model with the Serial Number.XiangRui Xu; YaQin Li; Cao Yuan Adversarial Attacks on Grid Events Classification: An Adversarial Machine Learning Approach.Iman Niazazari; Hanif Livani WITCHcraft: Efficient PGD attacks with random step size.Ping-Yeh Chiang; Jonas Geiping; Micah Goldblum; Tom Goldstein; Renkun Ni; Steven Reich; Ali Shafahi Deep Detector Health Management under Adversarial Campaigns.Javier Echauz; Keith Kenemer; Sarfaraz Hussein; Jay Dhaliwal; Saurabh Shintre; Slawomir Grzonkowski; Andrew Gardner 2019-11-17 Countering Inconsistent Labelling by Google's Vision API for Rotated Images.Aman Apte; Aritra Bandyopadhyay; K Akhilesh Shenoy; Jason Peter Andrews; Aditya Rathod; Manish Agnihotri; Aditya Jajodia Deep Verifier Networks: Verification of Deep Discriminative Models with Deep Generative Models.Tong Che; Xiaofeng Liu; Site Li; Yubin Ge; Ruixiang Zhang; Caiming Xiong; Yoshua Bengio Smoothed Inference for Adversarially-Trained Models.Yaniv Nemcovsky; Evgenii Zheltonozhskii; Chaim Baskin; Brian Chmiel; Maxim Fishman; Alex M. Bronstein; Avi Mendelson 2019-11-16 SMART: Skeletal Motion Action Recognition aTtack.He Wang; Feixiang He; Zexi Peng; Yongliang Yang; Tianjia Shao; Kun Zhou; David Hogg Suspicion-Free Adversarial Attacks on Clustering Algorithms.Anshuman Chhabra; Abhishek Roy; Prasant Mohapatra Black-Box Adversarial Attack with Transferable Model-based Embedding.Zhichao Huang; Tong Zhang Defensive Few-shot Adversarial Learning.Wenbin Li; Lei Wang; Xingxing Zhang; Jing Huo; Yang Gao; Jiebo Luo 2019-11-15 Learning To Characterize Adversarial Subspaces.Xiaofeng Mao; Yuefeng Chen; Yuhong Li; Yuan He; Hui Xue On Model Robustness Against Adversarial Examples.Shufei Zhang; Kaizhu Huang; Zenglin Xu Simple iterative method for generating targeted universal adversarial perturbations.Hokuto Hirano; Kazuhiro Takemoto AdvKnn: Adversarial Attacks On K-Nearest Neighbor Classifiers With Approximate Gradients.Xiaodan Li; Yuefeng Chen; Yuan He; Hui Xue 2019-11-14 Adversarial Embedding: A robust and elusive Steganography and Watermarking technique.Salah Ghamizi; Maxime Cordy; Mike Papadakis; Yves Le Traon Self-supervised Adversarial Training.Kejiang Chen; Hang Zhou; Yuefeng Chen; Xiaofeng Mao; Yuhong Li; Yuan He; Hui Xue; Weiming Zhang; Nenghai Yu DomainGAN: Generating Adversarial Examples to Attack Domain Generation Algorithm Classifiers.Isaac Corley; Jonathan Lwowski; Justin Hoffman CAGFuzz: Coverage-Guided Adversarial Generative Fuzzing Testing of Deep Learning Systems.Pengcheng Zhang; Qiyin Dai; Patrizio Pelliccione 2019-11-13 There is Limited Correlation between Coverage and Robustness for Deep Neural Networks.Yizhen Dong; Peixin Zhang; Jingyi Wang; Shuang Liu; Jun Sun; Jianye Hao; Xinyu Wang; Li Wang; Jin Song Dong; Dai Ting Adversarial Margin Maximization Networks.Ziang Yan; Yiwen Guo; Changshui Zhang 2019-11-12 Improving Robustness of Task Oriented Dialog Systems.Arash Einolghozati; Sonal Gupta; Mrinal Mohit; Rushin Shah On Robustness to Adversarial Examples and Polynomial Optimization.Pranjal Awasthi; Abhratanu Dutta; Aravindan Vijayaraghavan Adversarial Examples in Modern Machine Learning: A Review.Rey Reza Wiyatno; Anqi Xu; Ousmane Dia; Berker Archy de 2019-11-11 Few-Features Attack to Fool Machine Learning Models through Mask-Based GAN.Feng Chen; Yunkai Shang; Bo Xu; Jincheng Hu RNN-Test: Towards Adversarial Testing for Recurrent Neural Network Systems.Jianmin Guo; Yue Zhao; Quan Zhang; Yu Jiang Learning From Brains How to Regularize Machines.Zhe Li; Wieland Brendel; Edgar Y. Walker; Erick Cobos; Taliah Muhammad; Jacob Reimer; Matthias Bethge; Fabian H. Sinz; Xaq Pitkow; Andreas S. Tolias Robust Design of Deep Neural Networks against Adversarial Attacks based on Lyapunov Theory.Arash Rahnama; Andre T. Nguyen; Edward Raff CALPA-NET: Channel-pruning-assisted Deep Residual Network for Steganalysis of Digital Images.Shunquan Tan; Weilong Wu; Zilong Shao; Qiushi Li; Bin Li; Jiwu Huang GraphDefense: Towards Robust Graph Convolutional Networks.Xiaoyun Wang; Xuanqing Liu; Cho-Jui Hsieh 2019-11-09 A Reinforced Generation of Adversarial Samples for Neural Machine Translation.Wei Zou; Shujian Huang; Jun Xie; Xinyu Dai; Jiajun Chen Improving Machine Reading Comprehension via Adversarial Training.Ziqing Yang; Yiming Cui; Wanxiang Che; Ting Liu; Shijin Wang; Guoping Hu Adaptive versus Standard Descent Methods and Robustness Against Adversarial Examples.Marc Khoury Minimalistic Attacks: How Little it Takes to Fool a Deep Reinforcement Learning Policy.Xinghua Qu; Zhu Sun; Yew-Soon Ong; Abhishek Gupta; Pengfei Wei 2019-11-08 Intrusion Detection for Industrial Control Systems: Evaluation Analysis and Adversarial Attacks.Giulio Zizzo; Chris Hankin; Sergio Maffeis; Kevin Jones Patch augmentation: Towards efficient decision boundaries for neural networks.Marcus D. Bloice; Andreas Holzinger Domain Robustness in Neural Machine Translation.Mathias Müller; Annette Rios; Rico Sennrich Adversarial Attacks on GMM i-vector based Speaker Verification Systems.Xu Li; Jinghua Zhong; Xixin Wu; Jianwei Yu; Xunying Liu; Helen Meng Imperceptible Adversarial Attacks on Tabular Data.Vincent Ballet; Xavier Renard; Jonathan Aigrain; Thibault Laugel; Pascal Frossard; Marcin Detyniecki 2019-11-07 White-Box Target Attack for EEG-Based BCI Regression Problems.Lubin Meng; Chin-Teng Lin; Tzyy-Ring Jung; Dongrui Wu Active Learning for Black-Box Adversarial Attacks in EEG-Based Brain-Computer Interfaces.Xue Jiang; Xiao Zhang; Dongrui Wu 2019-11-06 Towards Large yet Imperceptible Adversarial Image Perturbations with Perceptual Color Distance.Zhengyu Zhao; Zhuoran Liu; Martha Larson Fooling LIME and SHAP: Adversarial Attacks on Post hoc Explanation Methods.Dylan Slack; Sophie Hilgard; Emily Jia; Sameer Singh; Himabindu Lakkaraju The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey.Olakunle Ibitoye; Rana Abou-Khamis; Ashraf Matrawy; M. Omair Shafiq Reversible Adversarial Example based on Reversible Image Transformation.Zhaoxia Yin; Hua Wang; Weiming Zhang 2019-11-05 Adversarial Enhancement for Community Detection in Complex Networks.Jiajun Zhou; Zhi Chen; Min Du; Lihong Chen; Shanqing Yu; Feifei Li; Guanrong Chen; Qi Xuan Test Metrics for Recurrent Neural Networks.Wei Huang; Youcheng Sun; James Sharp; Xiaowei Huang DLA: Dense-Layer-Analysis for Adversarial Example Detection.Philip Sperl; Ching-Yu Kao; Peng Chen; Konstantin Böttinger Intriguing Properties of Adversarial ML Attacks in the Problem Space.Fabio Pierazzi; Feargus Pendlebury; Jacopo Cortellazzi; Lorenzo Cavallaro 2019-11-04 Persistency of Excitation for Robustness of Neural Networks.Kamil Nar; S. Shankar Sastry Fast-UAP: An Algorithm for Speeding up Universal Adversarial Perturbation Generation with Orientation of Perturbation Vectors.Jiazhu Dai; Le Shu A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models.Ren Pang; Hua Shen; Xinyang Zhang; Shouling Ji; Yevgeniy Vorobeychik; Xiapu Luo; Alex Liu; Ting Wang 2019-11-03 Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems.Guangke Chen; Sen Chen; Lingling Fan; Xiaoning Du; Zhe Zhao; Fu Song; Yang Liu MadNet: Using a MAD Optimization for Defending Against Adversarial Attacks.Shai Rozenberg; Gal Elidan; Ran El-Yaniv 2019-11-02 Automatic Detection of Generated Text is Easiest when Humans are Fooled.Daphne Ippolito; Daniel Duckworth; Chris Callison-Burch; Douglas Eck Security of Facial Forensics Models Against Adversarial Attacks.Rong Huang; Fuming Fang; Huy H. Nguyen; Junichi Yamagishi; Isao Echizen 2019-10-31 Enhancing Certifiable Robustness via a Deep Model Ensemble.Huan Zhang; Minhao Cheng; Cho-Jui Hsieh Certifiable Robustness to Graph Perturbations.Aleksandar Bojchevski; Stephan Günnemann Adversarial Music: Real World Audio Adversary Against Wake-word Detection System.Juncheng B. Li; Shuhui Qu; Xinjian Li; Joseph Szurley; J. Zico Kolter; Florian Metze 2019-10-30 Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization.Rana Abou Khamis; Omair Shafiq; Ashraf Matrawy Beyond Universal Person Re-ID Attack.Wenjie Ding; Xing Wei; Rongrong Ji; Xiaopeng Hong; Qi Tian; Yihong Gong 2019-10-29 Adversarial Example in Remote Sensing Image Recognition.Li Chen; Guowei Zhu; Qi Li; Haifeng Li 2019-10-28 Active Subspace of Neural Networks: Structural Analysis and Universal Attacks.Chunfeng Cui; Kaiqi Zhang; Talgat Daulbaev; Julia Gusak; Ivan Oseledets; Zheng Zhang Certified Adversarial Robustness for Deep Reinforcement Learning.Björn Lütjens; Michael Everett; Jonathan P. How 2019-10-27 Word-level Textual Adversarial Attacking as Combinatorial Optimization.Yuan Zang; Fanchao Qi; Chenghao Yang; Zhiyuan Liu; Meng Zhang; Qun Liu; Maosong Sun EdgeFool: An Adversarial Image Enhancement Filter.Ali Shahin Shamsabadi; Changjae Oh; Andrea Cavallaro Spot Evasion Attacks: Adversarial Examples for License Plate Recognition Systems with Convolutional Neural Networks.Ya-guan Qian; Dan-feng Ma; Bin Wang; Jun Pan; Jia-min Wang; Jian-hai Chen; Wu-jie Zhou; Jing-sheng Lei 2019-10-26 Detection of Adversarial Attacks and Characterization of Adversarial Subspace.Mohammad Esmaeilpour; Patrick Cardinal; Alessandro Lameiras Koerich Understanding and Quantifying Adversarial Examples Existence in Linear Classification.Xupeng Shi; A. Adam Ding Adversarial Defense Via Local Flatness Regularization.Jia Xu; Yiming Li; Yong Jiang; Shu-Tao Xia 2019-10-25 Effectiveness of random deep feature selection for securing image manipulation detectors against adversarial examples.Mauro Barni; Ehsan Nowroozi; Benedetta Tondi; Bowen Zhang MediaEval 2019: Concealed FGSM Perturbations for Privacy Preservation.Panagiotis Linardos; Suzanne Little; Kevin McGuinness Label Smoothing and Logit Squeezing: A Replacement for Adversarial Training?Ali Shafahi; Amin Ghiasi; Furong Huang; Tom Goldstein 2019-10-24 ATZSL: Defensive Zero-Shot Recognition in the Presence of Adversaries.Xingxing Zhang; Shupeng Gui; Zhenfeng Zhu; Yao Zhao; Ji Liu 2019-10-23 A Useful Taxonomy for Adversarial Robustness of Neural Networks.Leslie N. Smith Wasserstein Smoothing: Certified Robustness against Wasserstein Adversarial Attacks.Alexander Levine; Soheil Feizi 2019-10-22 Attacking Optical Flow.Anurag Ranjan; Joel Janai; Andreas Geiger; Michael J. Black Adversarial Example Detection by Classification for Deep Speech Recognition.Saeid Samizade; Zheng-Hua Tan; Chao Shen; Xiaohong Guan Cross-Representation Transferability of Adversarial Attacks: From Spectrograms to Audio Waveforms.Karl M. Koerich; Mohammad Esmailpour; Sajjad Abdoli; Alceu S. Jr. Britto; Alessandro L. Koerich Structure Matters: Towards Generating Transferable Adversarial Images.Dan Peng; Zizhan Zheng; Linhao Luo; Xiaofeng Zhang 2019-10-21 Recovering Localized Adversarial Attacks.Jan Philip Göpfert; Heiko Wersing; Barbara Hammer Learning to Learn by Zeroth-Order Oracle.Yangjun Ruan; Yuanhao Xiong; Sashank Reddi; Sanjiv Kumar; Cho-Jui Hsieh An Alternative Surrogate Loss for PGD-based Adversarial Testing.Sven Gowal; Jonathan Uesato; Chongli Qin; Po-Sen Huang; Timothy Mann; Pushmeet Kohli 2019-10-20 Enhancing Recurrent Neural Networks with Sememes.Yujia Qin; Fanchao Qi; Sicong Ouyang; Zhiyuan Liu; Cheng Yang; Yasheng Wang; Qun Liu; Maosong Sun 2019-10-19 Adversarial Attacks on Spoofing Countermeasures of automatic speaker verification.Songxiang Liu; Haibin Wu; Hung-yi Lee; Helen Meng 2019-10-18 Toward Metrics for Differentiating Out-of-Distribution Sets.Mahdieh Abbasi; Changjian Shui; Arezoo Rajabi; Christian Gagne; Rakesh Bobba Are Perceptually-Aligned Gradients a General Property of Robust Classifiers?Simran Kaur; Jeremy Cohen; Zachary C. Lipton Spatial-aware Online Adversarial Perturbations Against Visual Object Tracking.Qing Guo; Xiaofei Xie; Lei Ma; Zhongguo Li; Wei Feng; Yang Liu A Fast Saddle-Point Dynamical System Approach to Robust Deep Learning.Yasaman Esfandiari; Aditya Balu; Keivan Ebrahimi; Umesh Vaidya; Nicola Elia; Soumik Sarkar 2019-10-17 Instance adaptive adversarial training: Improved accuracy tradeoffs in neural nets.Yogesh Balaji; Tom Goldstein; Judy Hoffman Enforcing Linearity in DNN succours Robustness and Adversarial Image Generation.Anindya Sarkar; Nikhil Kumar Gupta; Raghu Iyengar LanCe: A Comprehensive and Lightweight CNN Defense Methodology against Physical Adversarial Attacks on Embedded Multimedia Applications.Zirui Xu; Fuxun Yu; Xiang Chen Adversarial T-shirt! Evading Person Detectors in A Physical World.Kaidi Xu; Gaoyuan Zhang; Sijia Liu; Quanfu Fan; Mengshu Sun; Hongge Chen; Pin-Yu Chen; Yanzhi Wang; Xue Lin 2019-10-16 A New Defense Against Adversarial Images: Turning a Weakness into a Strength.Tao Yu; Shengyuan Hu; Chuan Guo; Wei-Lun Chao; Kilian Q. Weinberger 2019-10-15 Improving Robustness of time series classifier with Neural ODE guided gradient based data augmentation.Anindya Sarkar; Anirudh Sunder Raj; Raghu Sesha Iyengar Understanding Misclassifications by Attributes.Sadaf Gulshad; Zeynep Akata; Jan Hendrik Metzen; Arnold Smeulders Adversarial Examples for Models of Code.Noam Yefet; Uri Alon; Eran Yahav On adversarial patches: real-world attack on ArcFace-100 face recognition system.Mikhail Pautov; Grigorii Melnikov; Edgar Kaziakhmedov; Klim Kireev; Aleksandr Petiushko 2019-10-14 DeepSearch: Simple and Effective Blackbox Fuzzing of Deep Neural Networks.Fuyuan Zhang; Sankalan Pal Chowdhury; Maria Christakis Confidence-Calibrated Adversarial Training: Generalizing to Unseen Attacks.David Stutz; Matthias Hein; Bernt Schiele ZO-AdaMM: Zeroth-Order Adaptive Momentum Method for Black-Box Optimization.Xiangyi Chen; Sijia Liu; Kaidi Xu; Xingguo Li; Xue Lin; Mingyi Hong; David Cox Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models.Derek Derui; Wang; Chaoran Li; Sheng Wen; Surya Nepal; Yang Xiang Real-world adversarial attack on MTCNN face detection system.Edgar Kaziakhmedov; Klim Kireev; Grigorii Melnikov; Mikhail Pautov; Aleksandr Petiushko 2019-10-12 On Robustness of Neural Ordinary Differential Equations.Hanshu Yan; Jiawei Du; Vincent Y. F. Tan; Jiashi Feng 2019-10-11 Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems.Hadi Abdullah; Muhammad Sajidur Rahman; Washington Garcia; Logan Blue; Kevin Warren; Anurag Swarnim Yadav; Tom Shrimpton; Patrick Traynor Verification of Neural Networks: Specifying Global Robustness using Generative Models.Nathanaël Fijalkow; Mohit Kumar Gupta 2019-10-10 Universal Adversarial Perturbation for Text Classification.Hang Gao; Tim Oates Information Aware Max-Norm Dirichlet Networks for Predictive Uncertainty Estimation.Theodoros Tsiligkaridis 2019-10-09 Learning deep forest with multi-scale Local Binary Pattern features for face anti-spoofing.Rizhao Cai; Changsheng Chen Adversarial Learning of Deepfakes in Accounting.Marco Schreyer; Timur Sattarov; Bernd Reimer; Damian Borth Deep Latent Defence.Giulio Zizzo; Chris Hankin; Sergio Maffeis; Kevin Jones Adversarial Training: embedding adversarial perturbations into the parameter space of a neural network to build a robust system.Shixian Wen; Laurent Itti 2019-10-08 Directional Adversarial Training for Cost Sensitive Deep Learning Classification Applications.Matteo Terzi; Gian Antonio Susto; Pratik Chaudhari SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations.Ali Dabouei; Sobhan Soleymani; Fariborz Taherkhani; Jeremy Dawson; Nasser M. Nasrabadi 2019-10-07 Interpretable Disentanglement of Neural Networks by Extracting Class-Specific Subnetwork.Yulong Wang; Xiaolin Hu; Hang Su 2019-10-05 Unrestricted Adversarial Attacks for Semantic Segmentation.Guangyu Shen; Chengzhi Mao; Junfeng Yang; Baishakhi Ray Yet another but more efficient black-box adversarial attack: tiling and evolution strategies.Laurent Meunier; Jamal Atif; Olivier Teytaud 2019-10-04 Requirements for Developing Robust Neural Networks.John S. Hyatt; Michael S. Lee Adversarial Examples for Cost-Sensitive Classifiers.Gavin S. Hartnett; Andrew J. Lohn; Alexander P. Sedlack 2019-10-03 Perturbations are not Enough: Generating Adversarial Examples with Spatial Distortions.He Zhao; Trung Le; Paul Montague; Vel Olivier De; Tamas Abraham; Dinh Phung BUZz: BUffer Zones for defending adversarial examples in image classification.Kaleel Mahmood; Phuong Ha Nguyen; Lam M. Nguyen; Thanh Nguyen; Dijk Marten van Verification of Neural Network Behaviour: Formal Guarantees for Power System Applications.Andreas Venzke; Spyros Chatzivasileiadis 2019-10-02 Attacking Vision-based Perception in End-to-End Autonomous Driving Models.Adith Boloor; Karthik Garimella; Xin He; Christopher Gill; Yevgeniy Vorobeychik; Xuan Zhang Adversarially Robust Few-Shot Learning: A Meta-Learning Approach.Micah Goldblum; Liam Fowl; Tom Goldstein 2019-10-01 Boosting Image Recognition with Non-differentiable Constraints.Xuan Li; Yuchen Lu; Peng Xu; Jizong Peng; Christian Desrosiers; Xue Liu Generating Semantic Adversarial Examples with Differentiable Rendering.Lakshya Jain; Wilson Wu; Steven Chen; Uyeong Jang; Varun Chandrasekaran; Sanjit Seshia; Somesh Jha Attacking CNN-based anti-spoofing face authentication in the physical domain.Bowen Zhang; Benedetta Tondi; Mauro Barni An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack.Yang Zhang; Shiyu Chang; Mo Yu; Kaizhi Qian Cross-Layer Strategic Ensemble Defense Against Adversarial Examples.Wenqi Wei; Ling Liu; Margaret Loper; Ka-Ho Chow; Emre Gursoy; Stacey Truex; Yanzhao Wu Deep Neural Rejection against Adversarial Examples.Angelo Sotgiu; Ambra Demontis; Marco Melis; Battista Biggio; Giorgio Fumera; Xiaoyi Feng; Fabio Roli 2019-09-30 Black-box Adversarial Attacks with Bayesian Optimization.Satya Narayan Shukla; Anit Kumar Sahu; Devin Willmott; J. Zico Kolter Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML.Sijia Liu; Songtao Lu; Xiangyi Chen; Yao Feng; Kaidi Xu; Abdullah Al-Dujaili; Minyi Hong; Una-May O'Reilly Role of Spatial Context in Adversarial Robustness for Object Detection.Aniruddha Saha; Akshayvarun Subramanya; Koninika Patil; Hamed Pirsiavash 2019-09-29 Techniques for Adversarial Examples Threatening the Safety of Artificial Intelligence Based Systems.Utku Kose 2019-09-27 Maximal adversarial perturbations for obfuscation: Hiding certain attributes while preserving rest.Indu Ilanchezian; Praneeth Vepakomma; Abhishek Singh; Otkrist Gupta; G. N. Srinivasa Prasanna; Ramesh Raskar Impact of Low-bitwidth Quantization on the Adversarial Robustness for Embedded Neural Networks.Rémi Bernhard; Pierre-Alain Moellic; Jean-Max Dutertre 2019-09-26 Towards Understanding the Transferability of Deep Representations.Hong Liu; Mingsheng Long; Jianmin Wang; Michael I. Jordan Adversarial Machine Learning Attack on Modulation Classification.Muhammad Usama; Muhammad Asim; Junaid Qadir; Ala Al-Fuqaha; Muhammad Ali Imran Adversarial ML Attack on Self Organizing Cellular Networks.Salah-ud-din Farooq; Muhammad Usama; Junaid Qadir; Muhammad Ali Imran Towards neural networks that provably know when they don't know.Alexander Meinke; Matthias Hein Lower Bounds on Adversarial Robustness from Optimal Transport.Arjun Nitin Bhagoji; Daniel Cullina; Prateek Mittal 2019-09-25 Probabilistic Modeling of Deep Features for Out-of-Distribution and Adversarial Detection.Nilesh A. Ahuja; Ibrahima Ndiour; Trushant Kalyanpur; Omesh Tickoo Mixup Inference: Better Exploiting Mixup to Defend Adversarial Attacks.Tianyu Pang; Kun Xu; Jun Zhu FreeLB: Enhanced Adversarial Training for Natural Language Understanding.Chen Zhu; Yu Cheng; Zhe Gan; Siqi Sun; Tom Goldstein; Jingjing Liu 2019-09-24 A Visual Analytics Framework for Adversarial Text Generation.Brandon Laughlin; Christopher Collins; Karthik Sankaranarayanan; Khalil El-Khatib Intelligent image synthesis to attack a segmentation CNN using adversarial learning.Liang Chen; Paul Bentley; Kensaku Mori; Kazunari Misawa; Michitaka Fujiwara; Daniel Rueckert Sign-OPT: A Query-Efficient Hard-label Adversarial Attack.Minhao Cheng; Simranjit Singh; Patrick Chen; Pin-Yu Chen; Sijia Liu; Cho-Jui Hsieh 2019-09-23 MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.Jinyuan Jia; Ahmed Salem; Michael Backes; Yang Zhang; Neil Zhenqiang Gong Robust Local Features for Improving the Generalization of Adversarial Training.Chuanbiao Song; Kun He; Jiadong Lin; Liwei Wang; John E. Hopcroft FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments.Alesia Chernikova; Alina Oprea 2019-09-22 HAWKEYE: Adversarial Example Detector for Deep Neural Networks.Jinkyu Koo; Michael Roth; Saurabh Bagchi Towards Interpreting Recurrent Neural Networks through Probabilistic Abstraction.Guoliang Dong; Jingyi Wang; Jun Sun; Yang Zhang; Xinyu Wang; Ting Dai; Jin Song Dong; Xingen Wang 2019-09-20 Adversarial Learning with Margin-based Triplet Embedding Regularization.Yaoyao Zhong; Weihong Deng COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection.Aminollah Khormali; Ahmed Abusnaina; Songqing Chen; DaeHun Nyang; Aziz Mohaisen Defending Against Physically Realizable Attacks on Image Classification.Tong Wu; Liang Tong; Yevgeniy Vorobeychik 2019-09-19 Propagated Perturbation of Adversarial Attack for well-known CNNs: Empirical Study and its Explanation.Jihyeun Yoon; Kyungyul Kim; Jongseong Jang Adversarial Vulnerability Bounds for Gaussian Process Classification.Michael Thomas Smith; Kathrin Grosse; Michael Backes; Mauricio A Alvarez Absum: Simple Regularization Method for Reducing Structural Sensitivity of Convolutional Neural Networks.Sekitoshi Kanai; Yasutoshi Ida; Yasuhiro Fujiwara; Masanori Yamada; Shuichi Adachi Toward Robust Image Classification.Basemah Alshemali; Alta Graham; Jugal Kalita Training Robust Deep Neural Networks via Adversarial Noise Propagation.Aishan Liu; Xianglong Liu; Chongzhi Zhang; Hang Yu; Qiang Liu; Dacheng Tao 2019-09-17 Adversarial Attacks and Defenses in Images, Graphs and Text: A Review.Han Xu; Yao Ma; Haochen Liu; Debayan Deb; Hui Liu; Jiliang Tang; Anil Jain Generating Black-Box Adversarial Examples for Text Classifiers Using a Deep Reinforced Model.Prashanth Vijayaraghavan; Deb Roy Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges.Jinyuan Jia; Neil Zhenqiang Gong 2019-09-16 They Might NOT Be Giants: Crafting Black-Box Adversarial Examples with Fewer Queries Using Particle Swarm Optimization.Rayan Mosli; Matthew Wright; Bo Yuan; Yin Pan HAD-GAN: A Human-perception Auxiliary Defense GAN to Defend Adversarial Examples.Wanting Yu; Hongyi Yu; Lingyun Jiang; Mengli Zhang; Kai Qiao; Linyuan Wang; Bin Yan Towards Quality Assurance of Software Product Lines with Adversarial Configurations.Paul Temple; Mathieu Acher; Gilles Perrouin; Battista Biggio; Jean-marc Jezequel; Fabio Roli Interpreting and Improving Adversarial Robustness with Neuron Sensitivity.Chongzhi Zhang; Aishan Liu; Xianglong Liu; Yitao Xu; Hang Yu; Yuqing Ma; Tianlin Li 2019-09-15 An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms.Qianyu Guo; Sen Chen; Xiaofei Xie; Lei Ma; Qiang Hu; Hongtao Liu; Yang Liu; Jianjun Zhao; Xiaohong Li Detecting Adversarial Samples Using Influence Functions and Nearest Neighbors.Gilad Cohen; Guillermo Sapiro; Raja Giryes 2019-09-14 Natural Language Adversarial Attacks and Defenses in Word Level.Xiaosen Wang; Hao Jin; Kun He 2019-09-13 Adversarial Attack on Skeleton-based Human Action Recognition.Jian Liu; Naveed Akhtar; Ajmal Mian Say What I Want: Towards the Dark Side of Neural Dialogue Models.Haochen Liu; Tyler Derr; Zitao Liu; Jiliang Tang White-Box Adversarial Defense via Self-Supervised Data Estimation.Zudi Lin; Hanspeter Pfister; Ziming Zhang Defending Against Adversarial Attacks by Suppressing the Largest Eigenvalue of Fisher Information Matrix.Chaomin Shen; Yaxin Peng; Guixu Zhang; Jinsong Fan 2019-09-12 Inspecting adversarial examples using the Fisher information.Jörg Martin; Clemens Elster An Empirical Investigation of Randomized Defenses against Adversarial Attacks.Yannik Potdevin; Dirk Nowotka; Vijay Ganesh Transferable Adversarial Robustness using Adversarially Trained Autoencoders.Pratik Vaishnavi; Kevin Eykholt; Atul Prakash; Amir Rahmati 2019-09-11 Feedback Learning for Improving the Robustness of Neural Networks.Chang Song; Zuoguan Wang; Hai Li Sparse and Imperceivable Adversarial Attacks.Francesco Croce; Matthias Hein 2019-09-10 Localized Adversarial Training for Increased Accuracy and Robustness in Image Classification.Eitan Rothberg; Tingting Chen; Luo Jie; Hao Ji Identifying and Resisting Adversarial Videos Using Temporal Consistency.Xiaojun Jia; Xingxing Wei; Xiaochun Cao Effectiveness of Adversarial Examples and Defenses for Malware Classification.Robert Podschwadt; Hassan Takabi Towards Noise-Robust Neural Networks via Progressive Adversarial Training.Hang Yu; Aishan Liu; Xianglong Liu; Jichen Yang; Chongzhi Zhang UPC: Learning Universal Physical Camouflage Attacks on Object Detectors.Lifeng Huang; Chengying Gao; Yuyin Zhou; Changqing Zou; Cihang Xie; Alan Yuille; Ning Liu FDA: Feature Disruptive Attack.Aditya Ganeshan; B. S. Vivek; R. Venkatesh Babu Learning to Disentangle Robust and Vulnerable Features for Adversarial Detection.Byunggill Joe; Sung Ju Hwang; Insik Shin Toward Finding The Global Optimal of Adversarial Examples.Zhenxin Xiao; Kai-Wei Chang; Cho-Jui Hsieh 2019-09-09 Adversarial Robustness Against the Union of Multiple Perturbation Models.Pratyush Maini; Eric Wong; J. Zico Kolter 2019-09-08 STA: Adversarial Attacks on Siamese Trackers.Xugang Wu; Xiaoping Wang; Xu Zhou; Songlei Jian When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures.Gil Fidel; Ron Bitton; Asaf Shabtai 2019-09-06 Learning to Discriminate Perturbations for Blocking Adversarial Attacks in Text Classification.Yichao Zhou; Jyun-Yu Jiang; Kai-Wei Chang; Wei Wang Natural Adversarial Sentence Generation with Gradient-based Perturbation.Yu-Lun Hsieh; Minhao Cheng; Da-Cheng Juan; Wei Wei; Wen-Lian Hsu; Cho-Jui Hsieh Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information.Yiren Zhao; Ilia Shumailov; Han Cui; Xitong Gao; Robert Mullins; Ross Anderson 2019-09-05 Spatiotemporally Constrained Action Space Attacks on Deep Reinforcement Learning Agents.Xian Yeow Lee; Sambit Ghadai; Kai Liang Tan; Chinmay Hegde; Soumik Sarkar Adversarial Examples with Difficult Common Words for Paraphrase Identification.Zhouxing Shi; Minlie Huang; Ting Yao; Jingfang Xu 2019-09-04 Are Adversarial Robustness and Common Perturbation Robustness Independent Attributes ?Alfred Laugros; Alice Caplier; Matthieu Ospici 2019-09-03 Certified Robustness to Adversarial Word Substitutions.Robin Jia; Aditi Raghunathan; Kerem Göksel; Percy Liang Achieving Verified Robustness to Symbol Substitutions via Interval Bound Propagation.Po-Sen Huang; Robert Stanforth; Johannes Welbl; Chris Dyer; Dani Yogatama; Sven Gowal; Krishnamurthy Dvijotham; Pushmeet Kohli 2019-09-02 Metric Learning for Adversarial Robustness.Chengzhi Mao; Ziyuan Zhong; Junfeng Yang; Carl Vondrick; Baishakhi Ray 2019-08-29 Adversarial Training Methods for Network Embedding.Quanyu Dai; Xiao Shen; Liang Zhang; Qiang Li; Dan Wang Deep Neural Network Ensembles against Deception: Ensemble Diversity, Accuracy and Robustness.Ling Liu; Wenqi Wei; Ka-Ho Chow; Margaret Loper; Emre Gursoy; Stacey Truex; Yanzhao Wu Defending Against Misclassification Attacks in Transfer Learning.Bang Wu; Xiangwen Yang; Shuo Wang; Xingliang Yuan; Cong Wang; Carsten Rudolph Universal, transferable and targeted adversarial attacks.Junde Wu; Rao Fu 2019-08-26 A Statistical Defense Approach for Detecting Adversarial Examples.Alessandro Cennamo; Ido Freeman; Anton Kummert Gated Convolutional Networks with Hybrid Connectivity for Image Classification.Chuanguang Yang; Zhulin An; Hui Zhu; Xiaolong Hu; Kun Zhang; Kaiqiang Xu; Chao Li; Yongjun Xu 2019-08-25 Adversarial Edit Attacks for Tree Data.Benjamin Paaßen advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable Patterns.Zhibo Wang; Siyan Zheng; Mengkai Song; Qian Wang; Alireza Rahimpour; Hairong Qi 2019-08-24 Targeted Mismatch Adversarial Attack: Query with a Flower to Retrieve the Tower.Giorgos Tolias; Filip Radenovic; Ond{ř}ej Chum 2019-08-23 Improving Adversarial Robustness via Attention and Adversarial Logit Pairing.Dou Goodman; Xingjian Li; Jun Huan; Tao Wei AdvHat: Real-world adversarial attack on ArcFace Face ID system.Stepan Komkov; Aleksandr Petiushko 2019-08-22 Saliency Methods for Explaining Adversarial Attacks.Jindong Gu; Volker Tresp 2019-08-21 Testing Robustness Against Unforeseen Adversaries.Daniel Kang; Yi Sun; Dan Hendrycks; Tom Brown; Jacob Steinhardt Evaluating Defensive Distillation For Defending Text Processing Neural Networks Against Adversarial Examples.Marcus Soll; Tobias Hinz; Sven Magg; Stefan Wermter 2019-08-20 Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks.Ka-Ho Chow; Wenqi Wei; Yanzhao Wu; Ling Liu Transferring Robustness for Graph Neural Network Against Poisoning Attacks.Xianfeng Tang; Yandong Li; Yiwei Sun; Huaxiu Yao; Prasenjit Mitra; Suhang Wang 2019-08-19 Universal Adversarial Triggers for NLP.Eric Wallace; Shi Feng; Nikhil Kandpal; Matt Gardner; Sameer Singh Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses.Xiao Wang; Siyue Wang; Pin-Yu Chen; Yanzhi Wang; Brian Kulis; Xue Lin; Peter Chin Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries.Fnu Suya; Jianfeng Chi; David Evans; Yuan Tian 2019-08-18 On the Robustness of Human Pose Estimation.Sahil Shah; Naman jain; Abhishek Sharma; Arjun Jain Adversarial Defense by Suppressing High-frequency Components.Zhendong Zhang; Cheolkon Jung; Xiaolong Liang 2019-08-17 Verification of Neural Network Control Policy Under Persistent Adversarial Perturbation.Yuh-Shyang Wang; Tsui-Wei Weng; Luca Daniel Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks.Jiadong Lin; Chuanbiao Song; Kun He; Liwei Wang; John E. Hopcroft 2019-08-16 Adversarial point perturbations on 3D objects.Daniel Liu; Ronald Yu; Hao Su 2019-08-14 Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once.Jiangfan Han; Xiaoyi Dong; Ruimao Zhang; Dongdong Chen; Weiming Zhang; Nenghai Yu; Ping Luo; Xiaogang Wang AdvFaces: Adversarial Face Synthesis.Debayan Deb; Jianbang Zhang; Anil K. Jain DAPAS : Denoising Autoencoder to Prevent Adversarial attack in Semantic Segmentation.Seungju Cho; Tae Joon Jun; Byungsoo Oh; Daeyoung Kim 2019-08-12 On Defending Against Label Flipping Attacks on Malware Detection Systems.Rahim Taheri; Reza Javidan; Mohammad Shojafar; Zahra Pooranian; Ali Miri; Mauro Conti Adversarial Neural Pruning with Latent Vulnerability Suppression.Divyam Madaan; Jinwoo Shin; Sung Ju Hwang 2019-08-09 On the Adversarial Robustness of Neural Networks without Weight Transport.Mohamed Akrout 2019-08-08 Defending Against Adversarial Iris Examples Using Wavelet Decomposition.Sobhan Soleymani; Ali Dabouei; Jeremy Dawson; Nasser M. Nasrabadi Universal Adversarial Audio Perturbations.Sajjad Abdoli; Luiz G. Hafemann; Jerome Rony; Ismail Ben Ayed; Patrick Cardinal; Alessandro L. Koerich 2019-08-07 Improved Adversarial Robustness by Reducing Open Space Risk via Tent Activations.Andras Rozsa; Terrance E. Boult Investigating Decision Boundaries of Trained Neural Networks.Roozbeh Yousefzadeh; Dianne P O'Leary 2019-08-06 Explaining Deep Neural Networks Using Spectrum-Based Fault Localization.Youcheng Sun; Hana Chockler; Xiaowei Huang; Daniel Kroening MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks.Chen Ma; Chenxu Zhao; Hailin Shi; Li Chen; Junhai Yong; Dan Zeng BlurNet: Defense by Filtering the Feature Maps.Ravi Raju; Mikko Lipasti 2019-08-05 Random Directional Attack for Fooling Deep Neural Networks.Wenjian Luo; Chenwang Wu; Nan Zhou; Li Ni Adversarial Self-Defense for Cycle-Consistent GANs.Dina Bashkirova; Ben Usman; Kate Saenko Automated Detection System for Adversarial Examples with High-Frequency Noises Sieve.Dang Duy Thang; Toshihiro Matsui A principled approach for generating adversarial images under non-smooth dissimilarity metrics.Aram-Alexandre Pooladian; Chris Finlay; Tim Hoheisel; Adam Oberman Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems.Lea Schönherr; Thorsten Eisenhofer; Steffen Zeiler; Thorsten Holz; Dorothea Kolossa 2019-08-04 A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding Models.Heng Chang; Yu Rong; Tingyang Xu; Wenbing Huang; Honglei Zhang; Peng Cui; Wenwu Zhu; Junzhou Huang 2019-08-03 Exploring the Robustness of NMT Systems to Nonsensical Inputs.Akshay Chaturvedi; Abijith KP; Utpal Garain 2019-08-02 AdvGAN++ : Harnessing latent layers for adversary generation.Puneet Mangla; Surgan Jandial; Sakshi Varshney; Vineeth N Balasubramanian 2019-08-01 Black-box Adversarial ML Attack on Modulation Classification.Muhammad Usama; Junaid Qadir; Ala Al-Fuqaha Robustifying deep networks for image segmentation.Zheng Liu; Jinnian Zhang; Varun Jog; Po-Ling Loh; Alan B McMillan 2019-07-31 Adversarial Robustness Curves.Christina Göpfert; Jan Philip Göpfert; Barbara Hammer Optimal Attacks on Reinforcement Learning Policies.Alessio Russo; Alexandre Proutiere 2019-07-30 Impact of Adversarial Examples on Deep Learning Models for Biomedical Image Segmentation.Utku Ozbulak; Messem Arnout Van; Neve Wesley De Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding.Utku Ozbulak; Messem Arnout Van; Neve Wesley De 2019-07-28 Are Odds Really Odd? Bypassing Statistical Detection of Adversarial Examples.Hossein Hosseini; Sreeram Kannan; Radha Poovendran 2019-07-27 Is BERT Really Robust? A Strong Baseline for Natural Language Attack on Text Classification and Entailment.Di Jin; Zhijing Jin; Joey Tianyi Zhou; Peter Szolovits 2019-07-26 Understanding Adversarial Robustness: The Trade-off between Minimum and Average Margin.Kaiwen Wu; Yaoliang Yu On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method.Pu Zhao; Sijia Liu; Pin-Yu Chen; Nghia Hoang; Kaidi Xu; Bhavya Kailkhura; Xue Lin 2019-07-24 Towards Adversarially Robust Object Detection.Haichao Zhang; Jianyu Wang Joint Adversarial Training: Incorporating both Spatial and Pixel Attacks.Haichao Zhang; Jianyu Wang Defense Against Adversarial Attacks Using Feature Scattering-based Adversarial Training.Haichao Zhang; Jianyu Wang Weakly Supervised Localization using Min-Max Entropy: an Interpretable Framework.Soufiane Belharbi; Jérôme Rony; Jose Dolz; Ismail Ben Ayed; Luke McCaffrey; Eric Granger Understanding Adversarial Attacks on Deep Learning Based Medical Image Analysis Systems.Xingjun Ma; Yuhao Niu; Lin Gu; Yisen Wang; Yitian Zhao; James Bailey; Feng Lu 2019-07-23 Enhancing Adversarial Example Transferability with an Intermediate Level Attack.Qian Huang; Isay Katsman; Horace He; Zeqi Gu; Serge Belongie; Ser-Nam Lim 2019-07-21 Characterizing Attacks on Deep Reinforcement Learning.Chaowei Xiao; Xinlei Pan; Warren He; Jian Peng; Mingjie Sun; Jinfeng Yi; Bo Li; Dawn Song 2019-07-17 Connecting Lyapunov Control Theory to Adversarial Attacks.Arash Rahnama; Andre T. Nguyen; Edward Raff Robustness properties of Facebook's ResNeXt WSL models.A. Emin Orhan Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.Alessandro Erba; Riccardo Taormina; Stefano Galelli; Marcello Pogliani; Michele Carminati; Stefano Zanero; Nils Ole Tippenhauer 2019-07-16 Adversarial Security Attacks and Perturbations on Machine Learning and Deep Learning Methods.Arif Siddiqi Latent Adversarial Defence with Boundary-guided Generation.Xiaowei Zhou; Ivor W. Tsang; Jie Yin Natural Adversarial Examples.Dan Hendrycks; Kevin Zhao; Steven Basart; Jacob Steinhardt; Dawn Song Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving.Yulong Cao; Chaowei Xiao; Benjamin Cyr; Yimeng Zhou; Won Park; Sara Rampazzi; Qi Alfred Chen; Kevin Fu; Z. Morley Mao Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics.Yuxin Ma; Tiankai Xie; Jundong Li; Ross Maciejewski 2019-07-15 Graph Interpolating Activation Improves Both Natural and Robust Accuracies in Data-Efficient Deep Learning.Bao Wang; Stanley J. Osher Recovery Guarantees for Compressible Signals with Adversarial Noise.Jasjeet Dhaliwal; Kyle Hambrook 2019-07-14 Measuring the Transferability of Adversarial Examples.Deyan Petrov; Timothy M. Hospedales 2019-07-12 Unsupervised Adversarial Attacks on Deep Feature-based Retrieval with GAN.Guoping Zhao; Mingyu Zhang; Jiajun Liu; Ji-Rong Wen Stateful Detection of Black-Box Adversarial Attacks.Steven Chen; Nicholas Carlini; David Wagner Generative Modeling by Estimating Gradients of the Data Distribution.Yang Song; Stefano Ermon 2019-07-11 Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn.Ziv Katzir; Yuval Elovici Adversarial Objects Against LiDAR-Based Autonomous Driving Systems.Yulong Cao; Chaowei Xiao; Dawei Yang; Jing Fang; Ruigang Yang; Mingyan Liu; Bo Li 2019-07-10 Metamorphic Detection of Adversarial Examples in Deep Learning Models With Affine Transformations.Rohan Reddy Mekala; Gudjon Einar Magnusson; Adam Porter; Mikael Lindvall; Madeline Diep 2019-07-09 Generating Adversarial Fragments with Adversarial Networks for Physical-world Implementation.Zelun Kong; Cong Liu 2019-07-06 Affine Disentangled GAN for Interpretable and Robust AV Perception.Letao Liu; Martin Saerbeck; Justin Dauwels 2019-07-05 Detecting and Diagnosing Adversarial Images with Class-Conditional Capsule Reconstructions.Yao Qin; Nicholas Frosst; Sara Sabour; Colin Raffel; Garrison Cottrell; Geoffrey Hinton 2019-07-04 Adversarial Robustness through Local Linearization.Chongli Qin; James Martens; Sven Gowal; Dilip Krishnan; Krishnamurthy Dvijotham; Alhussein Fawzi; Soham De; Robert Stanforth; Pushmeet Kohli Adversarial Attacks in Sound Event Classification.Vinod Subramanian; Emmanouil Benetos; Ning Xu; SKoT McDonald; Mark Sandler 2019-07-03 Robust Synthesis of Adversarial Visual Examples Using a Deep Image Prior.Thomas Gittings; Steve Schneider; John Collomosse Minimally distorted Adversarial Examples with a Fast Adaptive Boundary Attack.Francesco Croce; Matthias Hein 2019-07-02 Efficient Cyber Attacks Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA.Moshe Kravchik; Asaf Shabtai Treant: Training Evasion-Aware Decision Trees.Stefano Calzavara; Claudio Lucchese; Gabriele Tolomei; Seyum Assefa Abebe; Salvatore Orlando 2019-07-01 Comment on "Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network".Roland S. Zimmermann Diminishing the Effect of Adversarial Perturbations via Refining Feature Representation.Nader Asadi; AmirMohammad Sarfi; Sahba Tahsini; Mahdi Eftekhari Accurate, reliable and fast robustness evaluation.Wieland Brendel; Jonas Rauber; Matthias Kümmerer; Ivan Ustyuzhaninov; Matthias Bethge 2019-06-30 Fooling a Real Car with Adversarial Traffic Signs.Nir Morgulis; Alexander Kreines; Shachar Mendelowitz; Yuval Weisglass 2019-06-28 Using Self-Supervised Learning Can Improve Model Robustness and Uncertainty.Dan Hendrycks; Mantas Mazeika; Saurav Kadavath; Dawn Song Certifiable Robustness and Robust Training for Graph Convolutional Networks.Daniel Zügner; Stephan Günnemann Learning to Cope with Adversarial Attacks.Xian Yeow Lee; Aaron Havens; Girish Chowdhary; Soumik Sarkar Robustness Guarantees for Deep Neural Networks on Videos.Min Wu; Marta Kwiatkowska 2019-06-27 Using Intuition from Empirical Properties to Simplify Adversarial Training Defense.Guanxiong Liu; Issa Khalil; Abdallah Khreishah Adversarial Robustness via Label-Smoothing.Morgane Goibert; Elvis Dohmatob Evolving Robust Neural Architectures to Defend from Adversarial Attacks.Shashank Kotyan; Danilo Vasconcellos Vargas 2019-06-26 The Adversarial Robustness of Sampling.Omri Ben-Eliezer; Eylon Yogev Defending Adversarial Attacks by Correcting logits.Yifeng Li; Lingxi Xie; Ya Zhang; Rui Zhang; Yanfeng Wang; Qi Tian 2019-06-25 Quantitative Verification of Neural Networks And its Security Applications.Teodora Baluta; Shiqi Shen; Shweta Shinde; Kuldeep S. Meel; Prateek Saxena Are Adversarial Perturbations a Showstopper for ML-Based CAD? A Case Study on CNN-Based Lithographic Hotspot Detection.Kang Liu; Haoyu Yang; Yuzhe Ma; Benjamin Tan; Bei Yu; Evangeline F. Y. Young; Ramesh Karri; Siddharth Garg 2019-06-24 Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals.Yunhan Huang; Quanyan Zhu 2019-06-22 Defending Against Adversarial Examples with K-Nearest Neighbor.Chawin Sitawarin; David Wagner 2019-06-21 Hiding Faces in Plain Sight: Disrupting AI Face Synthesis with Adversarial Perturbations.Yuezun Li; Xin Yang; Baoyuan Wu; Siwei Lyu A Fourier Perspective on Model Robustness in Computer Vision.Dong Yin; Raphael Gontijo Lopes; Jonathon Shlens; Ekin D. Cubuk; Justin Gilmer Evolution Attack On Neural Networks.YiGui Luo; RuiJia Yang; Wei Sha; WeiYi Ding; YouTeng Sun; YiSi Wang Adversarial Examples to Fool Iris Recognition Systems.Sobhan Soleymani; Ali Dabouei; Jeremy Dawson; Nasser M. Nasrabadi A Cyclically-Trained Adversarial Network for Invariant Representation Learning.Jiawei Chen; Janusz Konrad; Prakash Ishwar 2019-06-20 On Physical Adversarial Patches for Object Detection.Mark Lee; Zico Kolter 2019-06-19 Catfish Effect Between Internal and External Attackers:Being Semi-honest is Helpful.Hanqing Liu; Na Ruan; Joseph K. Liu Improving the robustness of ImageNet classifiers using elements of human visual cognition.A. Emin Orhan; Brenden M. Lake A unified view on differential privacy and robustness to adversarial examples.Rafael Pinot; Florian Yger; Cédric Gouy-Pailler; Jamal Atif Convergence of Adversarial Training in Overparametrized Networks.Ruiqi Gao; Tianle Cai; Haochuan Li; Liwei Wang; Cho-Jui Hsieh; Jason D. Lee Global Adversarial Attacks for Assessing Deep Learning Robustness.Hanbin Hu; Mit Shah; Jianhua Z. Huang; Peng Li Cloud-based Image Classification Service Is Not Robust To Simple Transformations: A Forgotten Battlefield.Dou Goodman; Tao Wei SemanticAdv: Generating Adversarial Examples via Attribute-conditional Image Editing.Haonan Qiu; Chaowei Xiao; Lei Yang; Xinchen Yan; Honglak Lee; Bo Li 2019-06-17 Adversarial attacks on Copyright Detection Systems.Parsa Saadatpanah; Ali Shafahi; Tom Goldstein Improving Black-box Adversarial Attacks with a Transfer-based Prior.Shuyu Cheng; Yinpeng Dong; Tianyu Pang; Hang Su; Jun Zhu The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks.Felix Assion; Peter Schlicht; Florens Greßner; Wiebke Günther; Fabian Hüger; Nico Schmidt; Umair Rasheed 2019-06-16 Interpolated Adversarial Training: Achieving Robust Neural Networks without Sacrificing Accuracy.Alex Lamb; Vikas Verma; Juho Kannala; Yoshua Bengio Defending Against Adversarial Attacks Using Random Forests.Yifan Ding; Liqiang Wang; Huan Zhang; Jinfeng Yi; Deliang Fan; Boqing Gong 2019-06-15 Representation Quality Of Neural Networks Links To Adversarial Attacks and Defences.Shashank Kotyan; Danilo Vasconcellos Vargas; Moe Matsuki 2019-06-14 Adversarial Training Can Hurt Generalization.Aditi Raghunathan; Sang Michael Xie; Fanny Yang; John C. Duchi; Percy Liang Towards Compact and Robust Deep Neural Networks.Vikash Sehwag; Shiqi Wang; Prateek Mittal; Suman Jana Perceptual Based Adversarial Audio Attacks.Joseph Szurley; J. Zico Kolter Copy and Paste: A Simple But Effective Initialization Method for Black-Box Adversarial Attacks.Thomas Brunner; Frederik Diehl; Alois Knoll Robust or Private? Adversarial Training Makes Models More Vulnerable to Privacy Attacks.Felipe A. Mejia; Paul Gamble; Zigfried Hampel-Arias; Michael Lomnitz; Nina Lopatina; Lucas Tindall; Maria Alejandra Barrios Towards Stable and Efficient Training of Verifiably Robust Neural Networks.Huan Zhang; Hongge Chen; Chaowei Xiao; Bo Li; Duane Boning; Cho-Jui Hsieh Adversarial Robustness Assessment: Why both $L_0$ and $L_\infty$ Attacks Are Necessary.Shashank Kotyan; Danilo Vasconcellos Vargas 2019-06-13 A Computationally Efficient Method for Defending Adversarial Deep Learning Attacks.Rajeev Sahay; Rehana Mahfuz; Aly El Gamal Lower Bounds for Adversarially Robust PAC Learning.Dimitrios I. Diochnos; Saeed Mahloujifar; Mohammad Mahmoody 2019-06-12 Tight Certificates of Adversarial Robustness for Randomly Smoothed Classifiers.Guang-He Lee; Yang Yuan; Shiyu Chang; Tommi S. Jaakkola 2019-06-11 Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks.Ziang Yan; Yiwen Guo; Changshui Zhang Mimic and Fool: A Task Agnostic Adversarial Attack.Akshay Chaturvedi; Utpal Garain Efficient and Accurate Estimation of Lipschitz Constants for Deep Neural Networks.Mahyar Fazlyab; Alexander Robey; Hamed Hassani; Manfred Morari; George J. Pappas 2019-06-10 E-LPIPS: Robust Perceptual Image Similarity via Random Transformation Ensembles.Markus Kettunen; Erik Härkönen; Jaakko Lehtinen Evaluating the Robustness of Nearest Neighbor Classifiers: A Primal-Dual Perspective.Lu Wang; Xuanqing Liu; Jinfeng Yi; Zhi-Hua Zhou; Cho-Jui Hsieh Robustness Verification of Tree-based Models.Hongge Chen; Huan Zhang; Si Si; Yang Li; Duane Boning; Cho-Jui Hsieh Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective.Kaidi Xu; Hongge Chen; Sijia Liu; Pin-Yu Chen; Tsui-Wei Weng; Mingyi Hong; Xue Lin 2019-06-09 On the Vulnerability of Capsule Networks to Adversarial Attacks.Felix Michels; Tobias Uelwer; Eric Upschulte; Stefan Harmeling Intriguing properties of adversarial training.Cihang Xie; Alan Yuille Improved Adversarial Robustness via Logit Regularization Methods.Cecilia Summers; Michael J. Dinneen Attacking Graph Convolutional Networks via Rewiring.Yao Ma; Suhang Wang; Tyler Derr; Lingfei Wu; Jiliang Tang Towards A Unified Min-Max Framework for Adversarial Exploration and Robustness.Jingkang Wang; Tianyun Zhang; Sijia Liu; Pin-Yu Chen; Jiacen Xu; Makan Fardad; Bo Li Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers.Hadi Salman; Greg Yang; Jerry Li; Pengchuan Zhang; Huan Zhang; Ilya Razenshteyn; Sebastien Bubeck 2019-06-08 Strategies to architect AI Safety: Defense to guard AI from Adversaries.Rajagopal. A; Nirmala. V Sensitivity of Deep Convolutional Networks to Gabor Noise.Kenneth T. Co; Luis Muñoz-González; Emil C. Lupu ML-LOO: Detecting Adversarial Examples with Feature Attribution.Puyudi Yang; Jianbo Chen; Cho-Jui Hsieh; Jane-Ling Wang; Michael I. Jordan Provably Robust Boosted Decision Stumps and Trees against Adversarial Attacks.Maksym Andriushchenko; Matthias Hein Making targeted black-box evasion attacks effective and efficient.Mika Juuti; Buse Gul Atli; N. Asokan Defending Against Universal Attacks Through Selective Feature Regeneration.Tejas Borkar; Felix Heide; Lina Karam 2019-06-07 A cryptographic approach to black box adversarial machine learning.Kevin Shi; Daniel Hsu; Allison Bishop Using learned optimizers to make models robust to input noise.Luke Metz; Niru Maheswaranathan; Jonathon Shlens; Jascha Sohl-Dickstein; Ekin D. Cubuk Efficient Project Gradient Descent for Ensemble Adversarial Attack.Fanyou Wu; Rado Gazo; Eva Haviarova; Bedrich Benes Inductive Bias of Gradient Descent based Adversarial Training on Separable Data.Yan Li; Ethan X. Fang; Huan Xu; Tuo Zhao Adversarial Explanations for Understanding Image Classification Decisions and Improved Neural Network Robustness.Walt Woods; Jack Chen; Christof Teuscher Robustness for Non-Parametric Classification: A Generic Attack and Defense.Yao-Yuan Yang; Cyrus Rashtchian; Yizhen Wang; Kamalika Chaudhuri 2019-06-06 Robust Attacks against Multiple Classifiers.Juan C. Perdomo; Yaron Singer Improving Robustness Without Sacrificing Accuracy with Patch Gaussian Augmentation.Raphael Gontijo Lopes; Dong Yin; Ben Poole; Justin Gilmer; Ekin D. Cubuk Understanding Adversarial Behavior of DNNs by Disentangling Non-Robust and Robust Components in Performance Metric.Yujun Shi; Benben Liao; Guangyong Chen; Yun Liu; Ming-Ming Cheng; Jiashi Feng Should Adversarial Attacks Use Pixel p-Norm?Ayon Sen; Xiaojin Zhu; Liam Marshall; Robert Nowak Image Synthesis with a Single (Robust) Classifier.Shibani Santurkar; Dimitris Tsipras; Brandon Tran; Andrew Ilyas; Logan Engstrom; Aleksander Madry 2019-06-05 MNIST-C: A Robustness Benchmark for Computer Vision.Norman Mu; Justin Gilmer Enhancing Gradient-based Attacks with Symbolic Intervals.Shiqi Wang; Yizheng Chen; Ahmed Abdou; Suman Jana Query-efficient Meta Attack to Deep Neural Networks.Jiawei Du; Hu Zhang; Joey Tianyi Zhou; Yi Yang; Jiashi Feng c-Eval: A Unified Metric to Evaluate Feature-based Explanations via Perturbation.Minh N. Vu; Truc D. Nguyen; NhatHai Phan; Ralucca Gera; My T. Thai Multi-way Encoding for Robustness.Donghyun Kim; Sarah Adel Bargal; Jianming Zhang; Stan Sclaroff 2019-06-04 Adversarial Training is a Form of Data-dependent Operator Norm Regularization.Kevin Roth; Yannic Kilcher; Thomas Hofmann 2019-06-03 Adversarial Exploitation of Policy Imitation.Vahid Behzadan; William Hsu RL-Based Method for Benchmarking the Adversarial Resilience and Robustness of Deep Reinforcement Learning Policies.Vahid Behzadan; William Hsu Adversarial Risk Bounds for Neural Networks through Sparsity based Compression.Emilio Rafael Balda; Arash Behboodi; Niklas Koep; Rudolf Mathar The Adversarial Machine Learning Conundrum: Can The Insecurity of ML Become The Achilles' Heel of Cognitive Networks?Muhammad Usama; Junaid Qadir; Ala Al-Fuqaha; Mounir Hamdi Adversarial Robustness as a Prior for Learned Representations.Logan Engstrom; Andrew Ilyas; Shibani Santurkar; Dimitris Tsipras; Brandon Tran; Aleksander Madry Achieving Generalizable Robustness of Deep Neural Networks by Stability Training.Jan Laermann; Wojciech Samek; Nils Strodthoff A Surprising Density of Illusionable Natural Speech.Melody Y. Guan; Gregory Valiant Fast and Stable Interval Bounds Propagation for Training Verifiably Robust Models.Paweł Morawiecki; Przemysław Spurek; Marek Śmieja; Jacek Tabor Understanding the Limitations of Conditional Generative Models.Ethan Fetaya; Jörn-Henrik Jacobsen; Will Grathwohl; Richard Zemel 2019-06-02 Adversarially Robust Generalization Just Requires More Unlabeled Data.Runtian Zhai; Tianle Cai; Di He; Chen Dan; Kun He; John Hopcroft; Liwei Wang 2019-06-01 Adversarial Examples for Edge Detection: They Exist, and They Transfer.Christian Cosgrove; Alan L. Yuille Perceptual Evaluation of Adversarial Attacks for CNN-based Image Classification.Sid Ahmed Fezza; Yassine Bakhti; Wassim Hamidouche; Olivier Déforges Enhancing Transformation-based Defenses using a Distribution Classifier.Connie Kou; Hwee Kuan Lee; Ee-Chien Chang; Teck Khim Ng 2019-05-31 Unlabeled Data Improves Adversarial Robustness.Yair Carmon; Aditi Raghunathan; Ludwig Schmidt; Percy Liang; John C. Duchi Reverse KL-Divergence Training of Prior Networks: Improved Uncertainty and Adversarial Robustness.Andrey Malinin; Mark Gales Are Labels Required for Improving Adversarial Robustness?Jonathan Uesato; Jean-Baptiste Alayrac; Po-Sen Huang; Robert Stanforth; Alhussein Fawzi; Pushmeet Kohli 2019-05-30 Real-Time Adversarial Attacks.Yuan Gong; Boyang Li; Christian Poellabauer; Yiyu Shi Residual Networks as Nonlinear Systems: Stability Analysis using Linearization.Kai Rothauge; Zhewei Yao; Zixi Hu; Michael W. Mahoney Identifying Classes Susceptible to Adversarial Attacks.Rangeet Pan; Md Johirul Islam; Shibbir Ahmed; Hridesh Rajan Robust Sparse Regularization: Simultaneously Optimizing Neural Network Robustness and Compactness.Adnan Siraj Rakin; Zhezhi He; Li Yang; Yanzhi Wang; Liqiang Wang; Deliang Fan Interpretable Adversarial Training for Text.Samuel Barham; Soheil Feizi 2019-05-29 Bandlimiting Neural Networks Against Adversarial Attacks.Yuping Lin; Kasra Ahmadi K. A.; Hui Jiang Misleading Authorship Attribution of Source Code using Adversarial Learning.Erwin Quiring; Alwin Maier; Konrad Rieck Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and The Way Forward.Adnan Qayyum; Muhammad Usama; Junaid Qadir; Ala Al-Fuqaha Functional Adversarial Attacks.Cassidy Laidlaw; Soheil Feizi CopyCAT: Taking Control of Neural Policies with Constant Attacks.Léonard Hussenot; Matthieu Geist; Olivier Pietquin 2019-05-28 ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation.Yuzhe Yang; Guo Zhang; Dina Katabi; Zhi Xu Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics.Yi Xiang Marcus Tan; Alfonso Iacovazzi; Ivan Homoliak; Yuval Elovici; Alexander Binder Improving the Robustness of Deep Neural Networks via Adversarial Training with Triplet Loss.Pengcheng Li; Jinfeng Yi; Bowen Zhou; Lijun Zhang Snooping Attacks on Deep Reinforcement Learning.Matthew Inkawhich; Yiran Chen; Hai Li Probabilistically True and Tight Bounds for Robust Deep Neural Network Training.Salman Alsubaihi; Adel Bibi; Modar Alfadly; Bernard Ghanem High Frequency Component Helps Explain the Generalization of Convolutional Neural Networks.Haohan Wang; Xindi Wu; Zeyi Huang; Eric P. Xing Empirically Measuring Concentration: Fundamental Limits on Intrinsic Robustness.Saeed Mahloujifar; Xiao Zhang; Mohammad Mahmoody; David Evans Cross-Domain Transferability of Adversarial Perturbations.Muzammal Naseer; Salman H. Khan; Harris Khan; Fahad Shahbaz Khan; Fatih Porikli Certifiably Robust Interpretation in Deep Learning.Alexander Levine; Sahil Singla; Soheil Feizi 2019-05-27 Brain-inspired reverse adversarial examples.Shaokai Ye; Sia Huat Tan; Kaidi Xu; Yanzhi Wang; Chenglong Bao; Kaisheng Ma Label Universal Targeted Attack.Naveed Akhtar; Mohammad A. A. K. Jalwana; Mohammed Bennamoun; Ajmal Mian Divide-and-Conquer Adversarial Detection.Xuwang Yin; Soheil Kolouri; Gustavo K. Rohde Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking.Yunhan Jia; Yantao Lu; Junjie Shen; Qi Alfred Chen; Zhenyu Zhong; Tao Wei Provable robustness against all adversarial $l_p$-perturbations for $p\geq 1$.Francesco Croce; Matthias Hein Scaleable input gradient regularization for adversarial robustness.Chris Finlay; Adam M Oberman Combating Adversarial Misspellings with Robust Word Recognition.Danish Pruthi; Bhuwan Dhingra; Zachary C. Lipton Analyzing the Interpretability Robustness of Self-Explaining Models.Haizhong Zheng; Earlence Fernandes; Atul Prakash Adversarially Robust Learning Could Leverage Computational Hardness.Sanjam Garg; Somesh Jha; Saeed Mahloujifar; Mohammad Mahmoody Unsupervised Euclidean Distance Attack on Network Embedding.Shanqing Yu; Jun Zheng; Jinhuan Wang; Jian Zhang; Lihong Chen; Qi Xuan; Jinyin Chen; Dan Zhang; Qingpeng Zhang 2019-05-26 State-Reification Networks: Improving Generalization by Modeling the Distribution of Hidden Representations.Alex Lamb; Jonathan Binas; Anirudh Goyal; Sandeep Subramanian; Ioannis Mitliagkas; Denis Kazakov; Yoshua Bengio; Michael C. Mozer Non-Determinism in Neural Networks for Adversarial Robustness.Daanish Ali Khan; Linhong Li; Ninghao Sha; Zhuoran Liu; Abelino Jimenez; Bhiksha Raj; Rita Singh Purifying Adversarial Perturbation with Adversarially Trained Auto-encoders.Hebi Li; Qi Xiao; Shixin Tian; Jin Tian Rearchitecting Classification Frameworks For Increased Robustness.Varun Chandrasekaran; Brian Tang; Nicolas Papernot; Kassem Fawaz; Somesh Jha; Xi Wu Robust Classification using Robust Feature Augmentation.Kevin Eykholt; Swati Gupta; Atul Prakash; Amir Rahmati; Pratik Vaishnavi; Haizhong Zheng Generalizable Adversarial Attacks Using Generative Models.Avishek Joey Bose; Andre Cianflone; William L. Hamilton 2019-05-25 Trust but Verify: An Information-Theoretic Explanation for the Adversarial Fragility of Machine Learning Systems, and a General Defense against Adversarial Attacks.Jirong Yi; Hui Xie; Leixin Zhou; Xiaodong Wu; Weiyu Xu; Raghuraman Mudumbai Adversarial Distillation for Ordered Top-k Attacks.Zekun Zhang; Tianfu Wu Adversarial Policies: Attacking Deep Reinforcement Learning.Adam Gleave; Michael Dennis; Cody Wild; Neel Kant; Sergey Levine; Stuart Russell Rethinking Softmax Cross-Entropy Loss for Adversarial Robustness.Tianyu Pang; Kun Xu; Yinpeng Dong; Chao Du; Ning Chen; Jun Zhu 2019-05-24 Robustness to Adversarial Perturbations in Learning from Incomplete Data.Amir Najafi; Shin-ichi Maeda; Masanori Koyama; Takeru Miyato Power up! Robust Graph Convolutional Network against Evasion Attacks based on Graph Powering.Ming Jin; Heng Chang; Wenwu Zhu; Somayeh Sojoudi Enhancing Adversarial Defense by k-Winners-Take-All.Chang Xiao; Peilin Zhong; Changxi Zheng 2019-05-23 A Direct Approach to Robust Deep Learning Using Adversarial Networks.Huaxia Wang; Chun-Nam Yu PHom-GeM: Persistent Homology for Generative Models.Jeremy Charlier; Radu State; Jean Hilger Thwarting finite difference adversarial attacks with output randomization.Haidar Khan; Daniel Park; Azer Khan; Bülent Yener Interpreting Adversarially Trained Convolutional Neural Networks.Tianyuan Zhang; Zhanxing Zhu Adversarially Robust Distillation.Micah Goldblum; Liam Fowl; Soheil Feizi; Tom Goldstein 2019-05-22 Convergence and Margin of Adversarial Training on Separable Data.Zachary Charles; Shashank Rajput; Stephen Wright; Dimitris Papailiopoulos Detecting Adversarial Examples and Other Misclassifications in Neural Networks by Introspection.Jonathan Aigrain; Marcin Detyniecki 2019-05-21 DoPa: A Fast and Comprehensive CNN Defense Methodology against Physical Adversarial Attacks.Zirui Xu; Fuxun Yu; Xiang Chen 2019-05-20 Adversarially robust transfer learning.Ali Shafahi; Parsa Saadatpanah; Chen Zhu; Amin Ghiasi; Christoph Studer; David Jacobs; Tom Goldstein 2019-05-19 Testing DNN Image Classifiers for Confusion & Bias Errors.Yuchi Tian; Ziyuan Zhong; Vicente Ordonez; Gail Kaiser; Baishakhi Ray 2019-05-18 What Do Adversarially Robust Models Look At?Takahiro Itazuri; Yoshihiro Fukuhara; Hirokatsu Kataoka; Shigeo Morishima Taking Care of The Discretization Problem:A Black-Box Adversarial Image Attack in Discrete Integer Domain.Yuchao Duan; Zhe Zhao; Lei Bu; Fu Song 2019-05-17 POPQORN: Quantifying Robustness of Recurrent Neural Networks.Ching-Yun Ko; Zhaoyang Lyu; Tsui-Wei Weng; Luca Daniel; Ngai Wong; Dahua Lin A critique of the DeepSec Platform for Security Analysis of Deep Learning Models.Nicholas Carlini Simple Black-box Adversarial Attacks.Chuan Guo; Jacob R. Gardner; Yurong You; Andrew Gordon Wilson; Kilian Q. Weinberger 2019-05-16 Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization.Seungyong Moon; Gaon An; Hyun Oh Song 2019-05-15 On Norm-Agnostic Robustness of Adversarial Training.Bai Li; Changyou Chen; Wenlin Wang; Lawrence Carin An Efficient Pre-processing Method to Eliminate Adversarial Effects.Hua Wang; Jie Wang; Zhaoxia Yin 2019-05-14 Robustification of deep net classifiers by key based diversified aggregation with pre-filtering.Olga Taran; Shideh Rezaeifar; Taras Holotyak; Slava Voloshynovskiy 2019-05-13 Adversarial Examples for Electrocardiograms.Xintian Han; Yuxuan Hu; Luca Foschini; Larry Chinitz; Lior Jankelson; Rajesh Ranganath Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks.Olakunle Ibitoye; Omair Shafiq; Ashraf Matrawy Harnessing the Vulnerability of Latent Layers in Adversarially Trained Models.Mayank Singh; Abhishek Sinha; Nupur Kumari; Harshitha Machiraju; Balaji Krishnamurthy; Vineeth N Balasubramanian 2019-05-11 Moving Target Defense for Deep Visual Sensing against Adversarial Examples.Qun Song; Zhenyu Yan; Rui Tan 2019-05-10 Interpreting and Evaluating Neural Network Robustness.Fuxun Yu; Zhuwei Qin; Chenchen Liu; Liang Zhao; Yanzhi Wang; Xiang Chen On the Connection Between Adversarial Robustness and Saliency Map Interpretability.Christian Etmann; Sebastian Lunz; Peter Maass; Carola-Bibiane Schönlieb Exact Adversarial Attack to Image Captioning via Structured Output Learning with Latent Variables.Yan Xu; Baoyuan Wu; Fumin Shen; Yanbo Fan; Yong Zhang; Heng Tao Shen; Wei Liu 2019-05-09 Adversarial Defense Framework for Graph Neural Network.Shen Wang; Zhengzhang Chen; Jingchao Ni; Xiao Yu; Zhichun Li; Haifeng Chen; Philip S. Yu Mitigating Deep Learning Vulnerabilities from Adversarial Examples Attack in the Cybersecurity Domain.Chris Einar San Agustin Exploring the Hyperparameter Landscape of Adversarial Robustness.Evelyn Duesterwald; Anupama Murthi; Ganesh Venkataraman; Mathieu Sinn; Deepak Vijaykeerthy Learning Interpretable Features via Adversarially Robust Optimization.Ashkan Khakzar; Shadi Albarqouni; Nassir Navab Universal Adversarial Perturbations for Speech Recognition Systems.Paarth Neekhara; Shehzeen Hussain; Prakhar Pandey; Shlomo Dubnov; Julian McAuley; Farinaz Koushanfar 2019-05-08 ROSA: Robust Salient Object Detection against Adversarial Attacks.Haofeng Li; Guanbin Li; Yizhou Yu Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction.Yunhan Jia; Yantao Lu; Senem Velipasalar; Zhenyu Zhong; Tao Wei Adversarial Image Translation: Unrestricted Adversarial Examples in Face Recognition Systems.Kazuya Kakizaki; Kosuke Yoshida 2019-05-07 A Comprehensive Analysis on Adversarial Robustness of Spiking Neural Networks.Saima Sharmin; Priyadarshini Panda; Syed Shakib Sarwar; Chankyu Lee; Wachirawit Ponghiran; Kaushik Roy Representation of White- and Black-Box Adversarial Examples in Deep Neural Networks and Humans: A Functional Magnetic Resonance Imaging Study.Chihye Han; Wonjun Yoon; Gihyun Kwon; Seungkyu Nam; Daeshik Kim An Empirical Evaluation of Adversarial Robustness under Transfer Learning.Todor Davchev; Timos Korres; Stathi Fotiadis; Nick Antonopoulos; Subramanian Ramamoorthy Adaptive Generation of Unrestricted Adversarial Inputs.Isaac Dunn; Hadrien Pouget; Tom Melham; Daniel Kroening 2019-05-06 Batch Normalization is a Cause of Adversarial Vulnerability.Angus Galloway; Anna Golubeva; Thomas Tanay; Medhat Moussa; Graham W. Taylor Adversarial Examples Are Not Bugs, They Are Features.Andrew Ilyas; Shibani Santurkar; Dimitris Tsipras; Logan Engstrom; Brandon Tran; Aleksander Madry 2019-05-05 Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples.Vikash Sehwag; Arjun Nitin Bhagoji; Liwei Song; Chawin Sitawarin; Daniel Cullina; Mung Chiang; Prateek Mittal 2019-05-03 Transfer of Adversarial Robustness Between Perturbation Types.Daniel Kang; Yi Sun; Tom Brown; Dan Hendrycks; Jacob Steinhardt 2019-05-02 Adversarial Training with Voronoi Constraints.Marc Khoury; Dylan Hadfield-Menell Weight Map Layer for Noise and Adversarial Attack Robustness.Mohammed Amer; Tomás Maul You Only Propagate Once: Accelerating Adversarial Training via Maximal Principle.Dinghuai Zhang; Tianyuan Zhang; Yiping Lu; Zhanxing Zhu; Bin Dong 2019-05-01 POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via Genetic Algorithm.Jinyin Chen; Mengmeng Su; Shijing Shen; Hui Xiong; Haibin Zheng Dropping Pixels for Adversarial Robustness.Hossein Hosseini; Sreeram Kannan; Radha Poovendran NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks.Yandong Li; Lijun Li; Liqiang Wang; Tong Zhang; Boqing Gong 2019-04-30 Test Selection for Deep Learning Systems.Wei Ma; Mike Papadakis; Anestis Tsakmalis; Maxime Cordy; Yves Le Traon Detecting Adversarial Examples through Nonlinear Dimensionality Reduction.Francesco Crecchi; Davide Bacciu; Battista Biggio 2019-04-29 Adversarial Training for Free!Ali Shafahi; Mahyar Najibi; Amin Ghiasi; Zheng Xu; John Dickerson; Christoph Studer; Larry S. Davis; Gavin Taylor; Tom Goldstein Adversarial Training and Robustness for Multiple Perturbations.Florian Tramèr; Dan Boneh 2019-04-27 Non-Local Context Encoder: Robust Biomedical Image Segmentation against Adversarial Attacks.Xiang He; Sibei Yang; Guanbin Li?; Haofeng Li; Huiyou Chang; Yizhou Yu 2019-04-26 Robustness Verification of Support Vector Machines.Francesco Ranzato; Marco Zanella 2019-04-24 A Robust Approach for Securing Audio Classification Against Adversarial Attacks.Mohammad Esmaeilpour; Patrick Cardinal; Alessandro Lameiras Koerich Physical Adversarial Textures that Fool Visual Object Tracking.Rey Reza Wiyatno; Anqi Xu 2019-04-23 Minimizing Perceived Image Quality Loss Through Adversarial Attack Scoping.Kostiantyn Khabarlak; Larysa Koriashkina 2019-04-22 blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness.Jiaming Zhang; Jitao Sang; Kaiyuan Xu; Shangxi Wu; Yongli Hu; Yanfeng Sun; Jian Yu Using Videos to Evaluate Image Model Robustness.Keren Gu; Brandon Yang; Jiquan Ngiam; Quoc Le; Jonathon Shlens 2019-04-21 Beyond Explainability: Leveraging Interpretability for Improved Adversarial Learning.Devinder Kumar; Ibrahim Ben-Daya; Kanav Vats; Jeffery Feng; Graham Taylor and; Alexander Wong 2019-04-20 Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach.Rahim Taheri; Reza Javidan; Mohammad Shojafar; Vinod P; Mauro Conti 2019-04-19 Salient Object Detection in the Deep Learning Era: An In-Depth Survey.Wenguan Wang; Qiuxia Lai; Huazhu Fu; Jianbing Shen; Haibin Ling; Ruigang Yang 2019-04-18 Fooling automated surveillance cameras: adversarial patches to attack person detection.Simen Thys; Ranst Wiebe Van; Toon Goedemé 2019-04-17 ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks.Guanxiong Liu; Issa Khalil; Abdallah Khreishah Defensive Quantization: When Efficiency Meets Robustness.Ji Lin; Chuang Gan; Song Han Interpreting Adversarial Examples with Attributes.Sadaf Gulshad; Jan Hendrik Metzen; Arnold Smeulders; Zeynep Akata Adversarial Defense Through Network Profiling Based Path Extraction.Yuxian Qiu; Jingwen Leng; Cong Guo; Quan Chen; Chao Li; Minyi Guo; Yuhao Zhu Gotta Catch 'Em All: Using Concealed Trapdoors to Detect Adversarial Attacks on Neural Networks.Shawn Shan; Emily Willson; Bolun Wang; Bo Li; Haitao Zheng; Ben Y. Zhao Semantic Adversarial Attacks: Parametric Transformations That Fool Deep Classifiers.Ameya Joshi; Amitangshu Mukherjee; Soumik Sarkar; Chinmay Hegde 2019-04-16 Reducing Adversarial Example Transferability Using Gradient Regularization.George Adam; Petr Smirnov; Benjamin Haibe-Kains; Anna Goldenberg AT-GAN: An Adversarial Generator Model for Non-constrained Adversarial Examples.Xiaosen Wang; Kun He; Chuanbiao Song; Liwei Wang; John E. Hopcroft 2019-04-15 Are Self-Driving Cars Secure? Evasion Attacks against Deep Neural Networks for Steering Angle Prediction.Alesia Chernikova; Alina Oprea; Cristina Nita-Rotaru; BaekGyu Kim Influence of Control Parameters and the Size of Biomedical Image Datasets on the Success of Adversarial Attacks.Vassili Kovalev; Dmitry Voynov 2019-04-13 Exploiting Vulnerabilities of Load Forecasting Through Adversarial Attacks.Yize Chen; Yushi Tan; Baosen Zhang 2019-04-12 Cycle-Consistent Adversarial GAN: the integration of adversarial attack and defense.Lingyun Jiang; Kai Qiao; Ruoxi Qin; Linyuan Wang; Jian Chen; Haibing Bu; Bin Yan Generating Minimal Adversarial Perturbations with Integrated Adaptive Gradients.Yatie Xiao; Chi-Man Pun Evaluating Robustness of Deep Image Super-Resolution against Adversarial Attacks.Jun-Ho Choi; Huan Zhang; Jun-Hyuk Kim; Cho-Jui Hsieh; Jong-Seok Lee Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks.David J. Miller; Zhen Xiang; George Kesidis Unrestricted Adversarial Examples via Semantic Manipulation.Anand Bhattad; Min Jin Chong; Kaizhao Liang; Bo Li; D. A. Forsyth 2019-04-11 Black-Box Decision based Adversarial Attack with Symmetric $\alpha$-stable Distribution.Vignesh Srinivasan; Ercan E. Kuruoglu; Klaus-Robert Müller; Wojciech Samek; Shinichi Nakajima 2019-04-10 Learning to Generate Synthetic Data via Compositing.Shashank Tripathi; Siddhartha Chandra; Amit Agrawal; Ambrish Tyagi; James M. Rehg; Visesh Chari Black-box Adversarial Attacks on Video Recognition Models.Linxi Jiang; Xingjun Ma; Shaoxiang Chen; James Bailey; Yu-Gang Jiang 2019-04-09 Generation & Evaluation of Adversarial Examples for Malware Obfuscation.Daniel Park; Haidar Khan; Bülent Yener 2019-04-08 Efficient Decision-based Black-box Adversarial Attacks on Face Recognition.Yinpeng Dong; Hang Su; Baoyuan Wu; Zhifeng Li; Wei Liu; Tong Zhang; Jun Zhu A Target-Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning.Shahbaz Rezaei; Xin Liu 2019-04-07 JumpReLU: A Retrofit Defense Strategy for Adversarial Attacks.N. Benjamin Erichson; Zhewei Yao; Michael W. Mahoney Malware Evasion Attack and Defense.Yonghong Huang; Utkarsh Verma; Celeste Fralick; Gabriel Infante-Lopez; Brajesh Kumarz; Carl Woodward 2019-04-06 On Training Robust PDF Malware Classifiers.Yizheng Chen; Shiqi Wang; Dongdong She; Suman Jana 2019-04-05 Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks.Yinpeng Dong; Tianyu Pang; Hang Su; Jun Zhu 2019-04-04 White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks.Yotam Gil; Yoav Chai; Or Gorodissky; Jonathan Berant Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks.Fatemeh Sheikholeslami; Swayambhoo Jain; Georgios B. Giannakis 2019-04-03 Understanding the efficacy, reliability and resiliency of computer vision techniques for malware detection and future research directions.Li Chen Interpreting Adversarial Examples by Activation Promotion and Suppression.Kaidi Xu; Sijia Liu; Gaoyuan Zhang; Mengshu Sun; Pu Zhao; Quanfu Fan; Chuang Gan; Xue Lin HopSkipJumpAttack: A Query-Efficient Decision-Based Attack.Jianbo Chen; Michael I. Jordan; Martin J. Wainwright Summit: Scaling Deep Learning Interpretability by Visualizing Activation and Attribution Summarizations.Fred Hohman; Haekyu Park; Caleb Robinson; Duen Horng Chau 2019-04-02 Adversarial Attacks against Deep Saliency Models.Zhaohui Che; Ali Borji; Guangtao Zhai; Suiyi Ling; Guodong Guo; Patrick Le Callet 2019-04-01 Curls & Whey: Boosting Black-Box Adversarial Attacks.Yucheng Shi; Siyu Wang; Yahong Han Robustness of 3D Deep Learning in an Adversarial Setting.Matthew Wicker; Marta Kwiatkowska Defending against adversarial attacks by randomized diversification.Olga Taran; Shideh Rezaeifar; Taras Holotyak; Slava Voloshynovskiy Adversarial Defense by Restricting the Hidden Space of Deep Neural Networks.Aamir Mustafa; Salman Khan; Munawar Hayat; Roland Goecke; Jianbing Shen; Ling Shao Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses.Yingwei Li; Song Bai; Cihang Xie; Zhenyu Liao; Xiaohui Shen; Alan L. Yuille 2019-03-31 On the Vulnerability of CNN Classifiers in EEG-Based BCIs.Xiao Zhang; Dongrui Wu 2019-03-29 Adversarial Robustness vs Model Compression, or Both?Shaokai Ye; Kaidi Xu; Sijia Liu; Hao Cheng; Jan-Henrik Lambrechts; Huan Zhang; Aojun Zhou; Kaisheng Ma; Yanzhi Wang; Xue Lin 2019-03-28 Benchmarking Neural Network Robustness to Common Corruptions and Perturbations.Dan Hendrycks; Thomas Dietterich Smooth Adversarial Examples.Hanwei Zhang; Yannis Avrithis; Teddy Furon; Laurent Amsaleg 2019-03-27 Rallying Adversarial Techniques against Deep Learning for Network Security.Joseph Clements; Yuzhe Yang; Ankur Sharma; Hongxin Hu; Yingjie Lao Bridging Adversarial Robustness and Gradient Interpretability.Beomsu Kim; Junghoon Seo; Taegyun Jeon Scaling up the randomized gradient-free adversarial attack reveals overestimation of robustness using established attacks.Francesco Croce; Jonas Rauber; Matthias Hein Text Processing Like Humans Do: Visually Attacking and Shielding NLP Systems.Steffen Eger; Gözde Gül Şahin; Andreas Rücklé; Ji-Ung Lee; Claudia Schulz; Mohsen Mesgar; Krishnkant Swarnkar; Edwin Simpson; Iryna Gurevych 2019-03-26 On the Adversarial Robustness of Multivariate Robust Estimation.Erhan Bayraktar; Lifeng Lai A geometry-inspired decision-based attack.Yujia Liu; Seyed-Mohsen Moosavi-Dezfooli; Pascal Frossard 2019-03-25 Defending against Whitebox Adversarial Attacks via Randomized Discretization.Yuchen Zhang; Percy Liang Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness.Jörn-Henrik Jacobsen; Jens Behrmannn; Nicholas Carlini; Florian Tramèr; Nicolas Papernot The LogBarrier adversarial attack: making effective use of decision boundary information.Chris Finlay; Aram-Alexandre Pooladian; Adam M. Oberman Robust Neural Networks using Randomized Adversarial Training.Alexandre Araujo; Laurent Meunier; Rafael Pinot; Benjamin Negrevergne 2019-03-24 A Formalization of Robustness for Deep Neural Networks.Tommaso Dreossi; Shromona Ghosh; Alberto Sangiovanni-Vincentelli; Sanjit A. Seshia Variational Inference with Latent Space Quantization for Adversarial Resilience.Vinay Kyatham; Mayank Mishra; Tarun Kumar Yadav; Deepak Mishra; Prathosh AP 2019-03-23 Improving Adversarial Robustness via Guided Complement Entropy.Hao-Yun Chen; Jhao-Hong Liang; Shih-Chieh Chang; Jia-Yu Pan; Yu-Ting Chen; Wei Wei; Da-Cheng Juan 2019-03-22 Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition.Yao Qin; Nicholas Carlini; Ian Goodfellow; Garrison Cottrell; Colin Raffel Fast Bayesian Uncertainty Estimation and Reduction of Batch Normalized Single Image Super-Resolution Network. (45%)Aupendu Kar; Prabir Kumar Biswas 2019-03-21 Adversarial camera stickers: A physical camera-based attack on deep learning systems.Juncheng Li; Frank R. Schmidt; J. Zico Kolter 2019-03-20 Provable Certificates for Adversarial Examples: Fitting a Ball in the Union of Polytopes.Matt Jordan; Justin Lewis; Alexandros G. Dimakis 2019-03-19 On the Robustness of Deep K-Nearest Neighbors.Chawin Sitawarin; David Wagner 2019-03-18 Generating Adversarial Examples With Conditional Generative Adversarial Net.Ping Yu; Kaitao Song; Jianfeng Lu Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems.Hadi Abdullah; Washington Garcia; Christian Peeters; Patrick Traynor; Kevin R. B. Butler; Joseph Wilson 2019-03-17 Adversarial Attacks on Deep Neural Networks for Time Series Classification.Hassan Ismail Fawaz; Germain Forestier; Jonathan Weber; Lhassane Idoumghar; Pierre-Alain Muller 2019-03-15 On Evaluation of Adversarial Perturbations for Sequence-to-Sequence Models.Paul Michel; Xian Li; Graham Neubig; Juan Miguel Pino On Certifying Non-uniform Bound against Adversarial Attacks.Chen Liu; Ryota Tomioka; Volkan Cevher 2019-03-14 A Research Agenda: Dynamic Models to Defend Against Correlated Attacks.Ian Goodfellow Attribution-driven Causal Analysis for Detection of Adversarial Examples.Susmit Jha; Sunny Raj; Steven Lawrence Fernandes; Sumit Kumar Jha; Somesh Jha; Gunjan Verma; Brian Jalaian; Ananthram Swami 2019-03-13 Adversarial attacks against Fact Extraction and VERification.James Thorne; Andreas Vlachos 2019-03-12 Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models.Adith Boloor; Xin He; Christopher Gill; Yevgeniy Vorobeychik; Xuan Zhang 2019-03-11 Can Adversarial Network Attack be Defended?Jinyin Chen; Yangyang Wu; Xiang Lin; Qi Xuan 2019-03-09 Manifold Preserving Adversarial Learning.Ousmane Amadou Dia; Elnaz Barshan; Reza Babanezhad 2019-03-07 Attack Type Agnostic Perceptual Enhancement of Adversarial Images.Bilgin Aksoy; Alptekin Temizel Out-domain examples for generative models.Dario Pasquini; Marco Mingione; Massimo Bernaschi 2019-03-06 GanDef: A GAN based Adversarial Training Defense for Neural Network Classifier.Guanxiong Liu; Issa Khalil; Abdallah Khreishah 2019-03-05 Statistical Guarantees for the Robustness of Bayesian Neural Networks.Luca Cardelli; Marta Kwiatkowska; Luca Laurenti; Nicola Paoletti; Andrea Patane; Matthew Wicker L 1-norm double backpropagation adversarial defense.Ismaïla LIMOS, LITIS Seck; Gaëlle LIMOS Loosli; Stephane LITIS Canu 2019-03-04 Defense Against Adversarial Images using Web-Scale Nearest-Neighbor Search.Abhimanyu Dubey; der Maaten Laurens van; Zeki Yalniz; Yixuan Li; Dhruv Mahajan The Vulnerabilities of Graph Convolutional Networks: Stronger Attacks and Defensive Techniques.Huijun Wu; Chen Wang; Yuriy Tyshetskiy; Andrew Dotcherty; Kai Lu; Liming Zhu Complement Objective Training.Hao-Yun Chen; Pei-Hsin Wang; Chun-Hao Liu; Shih-Chieh Chang; Jia-Yu Pan; Yu-Ting Chen; Wei Wei; Da-Cheng Juan Safety Verification and Robustness Analysis of Neural Networks via Quadratic Constraints and Semidefinite Programming.Mahyar Fazlyab; Manfred Morari; George J. Pappas 2019-03-03 A Kernelized Manifold Mapping to Diminish the Effect of Adversarial Perturbations.Saeid Asgari Taghanaki; Kumar Abhishek; Shekoofeh Azizi; Ghassan Hamarneh 2019-03-01 Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications.Bryse Flowers; R. Michael Buehrer; William C. Headley PuVAE: A Variational Autoencoder to Purify Adversarial Examples.Uiwon Hwang; Jaewoo Park; Hyemi Jang; Sungroh Yoon; Nam Ik Cho Attacking Graph-based Classification via Manipulating the Graph Structure.Binghui Wang; Neil Zhenqiang Gong 2019-02-28 On the Effectiveness of Low Frequency Perturbations.Yash Sharma; Gavin Weiguang Ding; Marcus Brubaker Enhancing the Robustness of Deep Neural Networks by Boundary Conditional GAN.Ke Sun; Zhanxing Zhu; Zhouchen Lin Towards Understanding Adversarial Examples Systematically: Exploring Data Size, Task and Model Factors.Ke Sun; Zhanxing Zhu; Zhouchen Lin Adversarial Attack and Defense on Point Sets.Qiang Zhang; Jiancheng Yang; Rongyao Fang; Bingbing Ni; Jinxian Liu; Qi Tian 2019-02-27 Adversarial Attacks on Time Series.Fazle Karim; Somshubra Majumdar; Houshang Darabi Robust Decision Trees Against Adversarial Examples.Hongge Chen; Huan Zhang; Duane Boning; Cho-Jui Hsieh Tensor Dropout for Robust Learning.Arinbjörn Kolbeinsson; Jean Kossaifi; Yannis Panagakis; Adrian Bulat; Anima Anandkumar; Ioanna Tzoulaki; Paul Matthews The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation Detection.Muhammad Zaid Hameed; Andras Gyorgy; Deniz Gunduz 2019-02-26 Disentangled Deep Autoencoding Regularization for Robust Image Classification.Zhenyu Duan; Martin Renqiang Min; Li Erran Li; Mingbo Cai; Yi Xu; Bingbing Ni Analyzing Deep Neural Networks with Symbolic Propagation: Towards Higher Precision and Faster Verification.Jianlin Li; Pengfei Yang; Jiangchao Liu; Liqian Chen; Xiaowei Huang; Lijun Zhang 2019-02-25 Verification of Non-Linear Specifications for Neural Networks.Chongli Dj Qin; Dj Krishnamurthy; Dvijotham; Brendan O'Donoghue; Rudy Bunel; Robert Stanforth; Sven Gowal; Jonathan Uesato; Grzegorz Swirszcz; Pushmeet Kohli Adversarial attacks hidden in plain sight.Jan Philip Göpfert; André Artelt; Heiko Wersing; Barbara Hammer 2019-02-24 MaskDGA: A Black-box Evasion Technique Against DGA Classifiers and Adversarial Defenses.Lior Sidi; Asaf Nadler; Asaf Shabtai Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking.Yi Han; David Hubczenko; Paul Montague; Vel Olivier De; Tamas Abraham; Benjamin I. P. Rubinstein; Christopher Leckie; Tansu Alpcan; Sarah Erfani 2019-02-23 Re-evaluating ADEM: A Deeper Look at Scoring Dialogue Responses.Ananya B. Sai; Mithun Das Gupta; Mitesh M. Khapra; Mukundhan Srinivasan A Deep, Information-theoretic Framework for Robust Biometric Recognition.Renjie Xie; Yanzhi Chen; Yan Wo; Qiao Wang 2019-02-22 Adversarial Attacks on Graph Neural Networks via Meta Learning.Daniel Zügner; Stephan Günnemann Physical Adversarial Attacks Against End-to-End Autoencoder Communication Systems.Meysam Sadeghi; Erik G. Larsson A Convex Relaxation Barrier to Tight Robustness Verification of Neural Networks.Hadi Salman; Greg Yang; Huan Zhang; Cho-Jui Hsieh; Pengchuan Zhang 2019-02-21 On the Sensitivity of Adversarial Robustness to Input Data Distributions.Gavin Weiguang Ding; Kry Yik Chau Lui; Xiaomeng Jin; Luyu Wang; Ruitong Huang Quantifying Perceptual Distortion of Adversarial Examples.Matt Jordan; Naren Manoj; Surbhi Goel; Alexandros G. Dimakis Wasserstein Adversarial Examples via Projected Sinkhorn Iterations.Eric Wong; Frank R. Schmidt; J. Zico Kolter 2019-02-20 advertorch v0.1: An Adversarial Robustness Toolbox based on PyTorch.Gavin Weiguang Ding; Luyu Wang; Xiaomeng Jin Perceptual Quality-preserving Black-Box Attack against Deep Learning Image Classifiers.Diego Gragnaniello; Francesco Marra; Giovanni Poggi; Luisa Verdoliva Graph Adversarial Training: Dynamically Regularizing Based on Graph Structure.Fuli Feng; Xiangnan He; Jie Tang; Tat-Seng Chua 2019-02-19 There are No Bit Parts for Sign Bits in Black-Box Attacks.Abdullah Al-Dujaili; Una-May O'Reilly 2019-02-18 On Evaluating Adversarial Robustness.Nicholas Carlini; Anish Athalye; Nicolas Papernot; Wieland Brendel; Jonas Rauber; Dimitris Tsipras; Ian Goodfellow; Aleksander Madry; Alexey Kurakin AuxBlocks: Defense Adversarial Example via Auxiliary Blocks.Yueyao Yu; Pengfei Yu; Wenye Li Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces.Mohsen Imani; Mohammad Saidur Rahman; Nate Mathews; Matthew Wright 2019-02-16 Mitigation of Adversarial Examples in RF Deep Classifiers Utilizing AutoEncoder Pre-training.Silvija Kokalj-Filipovic; Rob Miller; Nicholas Chang; Chi Leung Lau Adversarial Examples in RF Deep Learning: Detection of the Attack and its Physical Robustness.Silvija Kokalj-Filipovic; Rob Miller 2019-02-15 DeepFault: Fault Localization for Deep Neural Networks.Hasan Ferit Eniser; Simos Gerasimou; Alper Sen 2019-02-14 Can Intelligent Hyperparameter Selection Improve Resistance to Adversarial Examples?Cody Burkard; Brent Lagesse 2019-02-13 The Odds are Odd: A Statistical Test for Detecting Adversarial Examples.Kevin Roth; Yannic Kilcher; Thomas Hofmann 2019-02-12 Examining Adversarial Learning against Graph-based IoT Malware Detection Systems.Ahmed Abusnaina; Aminollah Khormali; Hisham Alasmary; Jeman Park; Afsah Anwar; Ulku Meteriz; Aziz Mohaisen 2019-02-11 Adversarial Samples on Android Malware Detection Systems for IoT Systems.Xiaolei Liu; Xiaojiang Du; Xiaosong Zhang; Qingxin Zhu; Mohsen Guizani A Survey: Towards a Robust Deep Neural Network in Text Domain.Wenqi Wang; Lina Wang; Benxiao Tang; Run Wang; Aoshuang Ye 2019-02-09 Model Compression with Adversarial Robustness: A Unified Optimization Framework.Shupeng University of Rochester Gui; Haotao Texas A&M University Wang; Chen University of Rochester Yu; Haichuan University of Rochester Yang; Zhangyang Texas A&M University Wang; Ji Ytech Seattle AI lab, FeDA lab, AI platform, Kwai Inc Liu When Causal Intervention Meets Adversarial Examples and Image Masking for Deep Neural Networks.Chao-Han Huck Yang; Yi-Chieh Liu; Pin-Yu Chen; Xiaoli Ma; Yi-Chang James Tsai 2019-02-08 Minimal Images in Deep Neural Networks: Fragile Object Recognition in Natural Images.Sanjana Srivastava; Guy Ben-Yosef; Xavier Boix Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis.Danilo Vasconcellos Vargas; Jiawei Su Discretization based Solutions for Secure Machine Learning against Adversarial Attacks.Priyadarshini Panda; Indranil Chakraborty; Kaushik Roy 2019-02-07 Robustness Of Saak Transform Against Adversarial Attacks.Thiyagarajan Ramanathan; Abinaya Manimaran; Suya You; C-C Jay Kuo Certified Adversarial Robustness via Randomized Smoothing.Jeremy M Cohen; Elan Rosenfeld; J. Zico Kolter 2019-02-06 Fooling Neural Network Interpretations via Adversarial Model Manipulation.Juyeon Heo; Sunghwan Joo; Taesup Moon Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples.Derui Wang; Chaoran Li; Sheng Wen; Xiaojun Chang; Surya Nepal; Yang Xiang 2019-02-05 Fatal Brain Damage.El Mahdi El Mhamdi; Rachid Guerraoui; Sergei Volodin 2019-02-04 Theoretical evidence for adversarial robustness through randomization.Rafael Pinot; Laurent Meunier; Alexandre Araujo; Hisashi Kashima; Florian Yger; Cédric Gouy-Pailler; Jamal Atif Predictive Uncertainty Quantification with Compound Density Networks.Agustinus Kristiadi; Sina Däubener; Asja Fischer Is Spiking Secure? A Comparative Study on the Security Vulnerabilities of Spiking and Deep Neural Networks.Alberto Marchisio; Giorgio Nanfa; Faiq Khalid; Muhammad Abdullah Hanif; Maurizio Martina; Muhammad Shafique 2019-02-01 Robustness Certificates Against Adversarial Examples for ReLU Networks.Sahil Singla; Soheil Feizi Natural and Adversarial Error Detection using Invariance to Image Transformations.Yuval Bahat; Michal Irani; Gregory Shakhnarovich Adaptive Gradient for Adversarial Perturbations Generation.Yatie Xiao; Chi-Man Pun Robustness of Generalized Learning Vector Quantization Models against Adversarial Attacks.Sascha Saralajew; Lars Holdijk; Maike Rees; Thomas Villmann The Efficacy of SHIELD under Different Threat Models.Cory Cornelius; Nilaksh Das; Shang-Tse Chen; Li Chen; Michael E. Kounavis; Duen Horng Chau 2019-01-31 A New Family of Neural Networks Provably Resistant to Adversarial Attacks.Rakshit Agrawal; Alfaro Luca de; David Helmbold Training Artificial Neural Networks by Generalized Likelihood Ratio Method: Exploring Brain-like Learning to Improve Robustness.Li Xiao; Yijie Peng; Jeff Hong; Zewu Ke; Shuhuai Yang 2019-01-30 A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance.Adi Shamir; Itay Safran; Eyal Ronen; Orr Dunkelman Augmenting Model Robustness with Transformation-Invariant Attacks.Houpu Yao; Zhe Wang; Guangyu Nie; Yassine Mazboudi; Yezhou Yang; Yi Ren 2019-01-29 Adversarial Examples Are a Natural Consequence of Test Error in Noise.Nic Ford; Justin Gilmer; Nicolas Carlini; Dogus Cubuk On the Effect of Low-Rank Weights on Adversarial Robustness of Neural Networks.Peter Langeberg; Emilio Rafael Balda; Arash Behboodi; Rudolf Mathar RED-Attack: Resource Efficient Decision based Attack for Machine Learning.Faiq Khalid; Hassan Ali; Muhammad Abdullah Hanif; Semeen Rehman; Rehan Ahmed; Muhammad Shafique Reliable Smart Road Signs.Muhammed O. Sayin; Chung-Wei Lin; Eunsuk Kang; Shinichi Shiraishi; Tamer Basar Adversarial Metric Attack and Defense for Person Re-identification.Song Bai; Yingwei Li; Yuyin Zhou; Qizhu Li; Philip H. S. Torr 2019-01-28 Improving Adversarial Robustness of Ensembles with Diversity Training.Sanjay Kariyappa; Moinuddin K. Qureshi CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks.Alberto Marchisio; Giorgio Nanfa; Faiq Khalid; Muhammad Abdullah Hanif; Maurizio Martina; Muhammad Shafique Defense Methods Against Adversarial Examples for Recurrent Neural Networks.Ishai Rosenberg; Asaf Shabtai; Yuval Elovici; Lior Rokach Using Pre-Training Can Improve Model Robustness and Uncertainty.Dan Hendrycks; Kimin Lee; Mantas Mazeika 2019-01-27 An Information-Theoretic Explanation for the Adversarial Fragility of AI Classifiers.Hui Xie; Jirong Yi; Weiyu Xu; Raghu Mudumbai Characterizing the Shape of Activation Space in Deep Neural Networks.Thomas Gebhart; Paul Schrater; Alan Hylton Strong Black-box Adversarial Attacks on Unsupervised Machine Learning Models.Anshuman Chhabra; Abhishek Roy; Prasant Mohapatra 2019-01-26 A Black-box Attack on Neural Networks Based on Swarm Evolutionary Algorithm.Xiaolei Liu; Yuheng Luo; Xiaosong Zhang; Qingxin Zhu Weighted-Sampling Audio Adversarial Example Attack.Xiaolei Liu; Xiaosong Zhang; Kun Wan; Qingxin Zhu; Yufei Ding 2019-01-25 Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data.Yi Shi; Yalin E. Sagduyu; Kemal Davaslioglu; Jason H. Li Improving Adversarial Robustness via Promoting Ensemble Diversity.Tianyu Pang; Kun Xu; Chao Du; Ning Chen; Jun Zhu 2019-01-24 Towards Interpretable Deep Neural Networks by Leveraging Adversarial Examples.Yinpeng Dong; Fan Bao; Hang Su; Jun Zhu Cross-Entropy Loss and Low-Rank Features Have Responsibility for Adversarial Examples.Kamil Nar; Orhan Ocal; S. Shankar Sastry; Kannan Ramchandran Theoretically Principled Trade-off between Robustness and Accuracy.Hongyang Zhang; Yaodong Yu; Jiantao Jiao; Eric P. Xing; Laurent El Ghaoui; Michael I. Jordan 2019-01-23 SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems.Tianyu Du; Shouling Ji; Jinfeng Li; Qinchen Gu; Ting Wang; Raheem Beyah Sitatapatra: Blocking the Transfer of Adversarial Samples.Ilia Shumailov; Xitong Gao; Yiren Zhao; Robert Mullins; Ross Anderson; Cheng-Zhong Xu 2019-01-21 Universal Rules for Fooling Deep Neural Networks based Text Classification.Di Li; Danilo Vasconcellos Vargas; Sakurai Kouichi Adversarial Attacks on Deep Learning Models in Natural Language Processing: A Survey.Wei Emma Zhang; Quan Z. Sheng; Ahoud Alhazmi; Chenliang Li Sensitivity Analysis of Deep Neural Networks.Hai Shu; Hongtu Zhu Perception-in-the-Loop Adversarial Examples.Mahmoud Salamati; Sadegh Soudjani; Rupak Majumdar 2019-01-17 Easy to Fool? Testing the Anti-evasion Capabilities of PDF Malware Scanners.Saeed TU Darmstadt Ehteshamifar; Antonio xorlab Barresi; Thomas R. ETH Zurich Gross; Michael TU Darmstadt Pradel 2019-01-15 The Limitations of Adversarial Training and the Blind-Spot Attack.Huan Zhang; Hongge Chen; Zhao Song; Duane Boning; Inderjit S. Dhillon; Cho-Jui Hsieh 2019-01-13 Generating Adversarial Perturbation with Root Mean Square Gradient.Yatie Xiao; Chi-Man Pun; Jizhe Zhou 2019-01-12 ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System.Huangxun Chen; Chenyu Huang; Qianyi Huang; Qian Zhang; Wei Wang 2019-01-11 Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries.Luca Demetrio; Battista Biggio; Giovanni Lagorio; Fabio Roli; Alessandro Armando 2019-01-10 Characterizing and evaluating adversarial examples for Offline Handwritten Signature Verification.Luiz G. Hafemann; Robert Sabourin; Luiz S. Oliveira Image Transformation can make Neural Networks more robust against Adversarial Examples.Dang Duy Thang; Toshihiro Matsui 2019-01-09 Extending Adversarial Attacks and Defenses to Deep 3D Point Cloud Classifiers.Daniel Liu; Ronald Yu; Hao Su 2019-01-08 Interpretable BoW Networks for Adversarial Example Detection.Krishna Kanth Nakka; Mathieu Salzmann 2019-01-07 Image Super-Resolution as a Defense Against Adversarial Attacks.Aamir Mustafa; Salman H. Khan; Munawar Hayat; Jianbing Shen; Ling Shao 2019-01-05 Fake News Detection via NLP is Vulnerable to Adversarial Attacks.Zhixuan Zhou; Huankang Guan; Meghana Moorthy Bhat; Justin Hsu 2019-01-04 Adversarial Examples Versus Cloud-based Detectors: A Black-box Empirical Study.Xurong Li; Shouling Ji; Meng Han; Juntao Ji; Zhenyu Ren; Yushan Liu; Chunming Wu 2019-01-02 Multi-Label Adversarial Perturbations.Qingquan Song; Haifeng Jin; Xiao Huang; Xia Hu Adversarial Robustness May Be at Odds With Simplicity.Preetum Nakkiran 2019-01-01 A Noise-Sensitivity-Analysis-Based Test Prioritization Technique for Deep Neural Networks.Long Zhang; Xuechao Sun; Yong Li; Zhenyu Zhang 2018-12-27 DeepBillboard: Systematic Physical-World Testing of Autonomous Driving Systems.Husheng Zhou; Wei Li; Yuankun Zhu; Yuqun Zhang; Bei Yu; Lingming Zhang; Cong Liu 2018-12-26 Adversarial Attack and Defense on Graph Data: A Survey.Lichao Sun; Yingtong Dou; Carl Yang; Ji Wang; Philip S. Yu; Lifang He; Bo Li 2018-12-25 A Data-driven Adversarial Examples Recognition Framework via Adversarial Feature Genome.Li Chen; Hailun Ding; Qi Li; Jiawei Zhu; Jian Peng; Haifeng Li Noise Flooding for Detecting Audio Adversarial Examples Against Automatic Speech Recognition.Krishan Rajaratnam; Jugal Kalita PPD: Permutation Phase Defense Against Adversarial Examples in Deep Learning.Mehdi Jafarnia-Jahromi; Tasmin Chowdhury; Hsin-Tai Wu; Sayandev Mukherjee A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples.Qiang Zeng; Jianhai Su; Chenglong Fu; Golam Kayas; Lannan Luo Seeing isn't Believing: Practical Adversarial Attack Against Object Detectors.Yue Zhao; Hong Zhu; Ruigang Liang; Qintao Shen; Shengzhi Zhang; Kai Chen 2018-12-24 DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense.Hang Zhou; Kejiang Chen; Weiming Zhang; Han Fang; Wenbo Zhou; Nenghai Yu 2018-12-23 Guessing Smart: Biased Sampling for Efficient Black-Box Adversarial Attacks.Thomas Brunner; Frederik Diehl; Michael Truong Le; Alois Knoll Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks.Ankur Chowdhary; Sailik Sengupta; Dijiang Huang; Subbarao Kambhampati 2018-12-22 Exploiting the Inherent Limitation of L0 Adversarial Examples.Fei Zuo; Bokai Yang; Xiaopeng Li; Lannan Luo; Qiang Zeng 2018-12-21 Dissociable neural representations of adversarially perturbed images in convolutional neural networks and the human brain.Chi Zhang; Xiaohan Duan; Linyuan Wang; Yongli Li; Bin Yan; Guoen Hu; Ruyuan Zhang; Li Tong 2018-12-19 Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and AICS'2019 Challenge.Deqiang Li; Qianmu Li; Yanfang Ye; Shouhuai Xu 2018-12-18 PROVEN: Certifying Robustness of Neural Networks with a Probabilistic Approach.Tsui-Wei Weng; Pin-Yu Chen; Lam M. Nguyen; Mark S. Squillante; Ivan Oseledets; Luca Daniel 2018-12-17 Spartan Networks: Self-Feature-Squeezing Neural Networks for increased robustness in adversarial settings.François Menet; Paul Berthier; José M. Fernandez; Michel Gagnon Designing Adversarially Resilient Classifiers using Resilient Feature Engineering.Kevin Eykholt; Atul Prakash A Survey of Safety and Trustworthiness of Deep Neural Networks.Xiaowei Huang; Daniel Kroening; Wenjie Ruan; James Sharp; Youcheng Sun; Emese Thamo; Min Wu; Xinping Yi 2018-12-16 Defense-VAE: A Fast and Accurate Defense against Adversarial Attacks.Xiang Li; Shihao Ji 2018-12-15 Perturbation Analysis of Learning Algorithms: A Unifying Perspective on Generation of Adversarial Examples.Emilio Rafael Balda; Arash Behboodi; Rudolf Mathar Trust Region Based Adversarial Attack on Neural Networks.Zhewei Yao; Amir Gholami; Peng Xu; Kurt Keutzer; Michael Mahoney 2018-12-14 Adversarial Sample Detection for Deep Neural Network through Model Mutation Testing.Jingyi Wang; Guoliang Dong; Jun Sun; Xinyu Wang; Peixin Zhang 2018-12-13 TextBugger: Generating Adversarial Text Against Real-world Applications.Jinfeng Li; Shouling Ji; Tianyu Du; Bo Li; Ting Wang Why ReLU networks yield high-confidence predictions far away from the training data and how to mitigate the problem.Matthias Hein; Maksym Andriushchenko; Julian Bitterwolf 2018-12-12 Thwarting Adversarial Examples: An $L_0$-RobustSparse Fourier Transform.Mitali Bafna; Jack Murtagh; Nikhil Vyas 2018-12-11 On the Security of Randomized Defenses Against Adversarial Samples.Kumar Sharad; Giorgia Azzurra Marson; Hien Thi Thu Truong; Ghassan Karame Adversarial Framing for Image and Video Classification.Konrad Zolna; Michal Zajac; Negar Rostamzadeh; Pedro O. Pinheiro 2018-12-10 Defending Against Universal Perturbations With Shared Adversarial Training.Chaithanya Kumar Mummadi; Thomas Brox; Jan Hendrik Metzen 2018-12-08 Feature Denoising for Improving Adversarial Robustness.Cihang Xie; Yuxin Wu; der Maaten Laurens van; Alan Yuille; Kaiming He AutoGAN: Robust Classifier Against Adversarial Attacks.Blerta Lindqvist; Shridatt Sugrim; Rauf Izmailov Detecting Adversarial Examples in Convolutional Neural Networks.Stefanos Pertigkiozoglou; Petros Maragos Learning Transferable Adversarial Examples via Ghost Networks.Yingwei Li; Song Bai; Yuyin Zhou; Cihang Xie; Zhishuai Zhang; Alan Yuille 2018-12-07 Deep-RBF Networks Revisited: Robust Classification with Rejection.Pourya Habib Zadeh; Reshad Hosseini; Suvrit Sra Combatting Adversarial Attacks through Denoising and Dimensionality Reduction: A Cascaded Autoencoder Approach.Rajeev Sahay; Rehana Mahfuz; Aly El Gamal 2018-12-06 Adversarial Defense of Image Classification Using a Variational Auto-Encoder.Yi Luo; Henry Pfister Adversarial Attacks, Regression, and Numerical Stability Regularization.Andre T. Nguyen; Edward Raff Prior Networks for Detection of Adversarial Attacks.Andrey Malinin; Mark Gales Towards Leveraging the Information of Gradients in Optimization-based Adversarial Attack.Jingyang Zhang; Hsin-Pai Cheng; Chunpeng Wu; Hai Li; Yiran Chen Fooling Network Interpretation in Image Classification.Akshayvarun Subramanya; Vipin Pillai; Hamed Pirsiavash The Limitations of Model Uncertainty in Adversarial Settings.Kathrin Grosse; David Pfaff; Michael Thomas Smith; Michael Backes MMA Training: Direct Input Space Margin Maximization through Adversarial Training.Gavin Weiguang Ding; Yash Sharma; Kry Yik Chau Lui; Ruitong Huang 2018-12-05 On Configurable Defense against Adversarial Example Attacks.Bo Luo; Min Li; Yu Li; Qiang Xu Regularized Ensembles and Transferability in Adversarial Learning.Yifan Chen; Yevgeniy Vorobeychik SADA: Semantic Adversarial Diagnostic Attacks for Autonomous Applications.Abdullah Hamdi; Matthias Müller; Bernard Ghanem 2018-12-04 Rigorous Agent Evaluation: An Adversarial Approach to Uncover Catastrophic Failures.Jonathan Dj Uesato; Ananya Dj Kumar; Csaba Dj Szepesvari; Tom Dj Erez; Avraham Dj Ruderman; Keith Dj Anderson; Dj Krishmamurthy; Dvijotham; Nicolas Heess; Pushmeet Kohli Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples.Huangyi Ge; Sze Yiu Chau; Bruno Ribeiro; Ninghui Li 2018-12-03 Disentangling Adversarial Robustness and Generalization.David Stutz; Matthias Hein; Bernt Schiele Interpretable Deep Learning under Fire.Xinyang Zhang; Ningfei Wang; Hua Shen; Shouling Ji; Xiapu Luo; Ting Wang Adversarial Example Decomposition.Horace He; Aaron Lou; Qingxuan Jiang; Isay Katsman; Serge Belongie; Ser-Nam Lim 2018-12-02 Model-Reuse Attacks on Deep Learning Systems.Yujie Ji; Xinyang Zhang; Shouling Ji; Xiapu Luo; Ting Wang Universal Perturbation Attack Against Image Retrieval.Jie Li; Rongrong Ji; Hong Liu; Xiaopeng Hong; Yue Gao; Qi Tian 2018-12-01 FineFool: Fine Object Contour Attack via Attention.Jinyin Chen; Haibin Zheng; Hui Xiong; Mengmeng Su Building robust classifiers through generation of confident out of distribution examples.Kumar Sricharan; Ashok Srivastava Discrete Adversarial Attacks and Submodular Optimization with Applications to Text Classification.Qi Lei; Lingfei Wu; Pin-Yu Chen; Alexandros G. Dimakis; Inderjit S. Dhillon; Michael Witbrock Effects of Loss Functions And Target Representations on Adversarial Robustness.Sean Saito; Sujoy Roy SentiNet: Detecting Localized Universal Attacks Against Deep Learning Systems.Edward Chou; Florian Tramèr; Giancarlo Pellegrino 2018-11-30 Transferable Adversarial Attacks for Image and Video Object Detection.Xingxing Wei; Siyuan Liang; Xiaochun Cao; Jun Zhu ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples.Xiaojun Jia; Xingxing Wei; Xiaochun Cao; Hassan Foroosh Adversarial Defense by Stratified Convolutional Sparse Coding.Bo Sun; Nian-hsuan Tsai; Fangchen Liu; Ronald Yu; Hao Su 2018-11-29 CNN-Cert: An Efficient Framework for Certifying Robustness of Convolutional Neural Networks.Akhilan Boopathy; Tsui-Wei Weng; Pin-Yu Chen; Sijia Liu; Luca Daniel Bayesian Adversarial Spheres: Bayesian Inference and Adversarial Examples in a Noiseless Setting.Artur Bekasov; Iain Murray Adversarial Examples as an Input-Fault Tolerance Problem.Angus Galloway; Anna Golubeva; Graham W. Taylor Analyzing Federated Learning through an Adversarial Lens.Arjun Nitin Bhagoji; Supriyo Chakraborty; Prateek Mittal; Seraphin Calo 2018-11-28 Adversarial Attacks for Optical Flow-Based Action Recognition Classifiers.Nathan Inkawhich; Matthew Inkawhich; Yiran Chen; Hai Li Strike (with) a Pose: Neural Networks Are Easily Fooled by Strange Poses of Familiar Objects.Michael A. Alcorn; Qi Li; Zhitao Gong; Chengfei Wang; Long Mai; Wei-Shinn Ku; Anh Nguyen A randomized gradient-free attack on ReLU networks.Francesco Croce; Matthias Hein Adversarial Machine Learning And Speech Emotion Recognition: Utilizing Generative Adversarial Networks For Robustness.Siddique Latif; Rajib Rana; Junaid Qadir 2018-11-27 Robust Classification of Financial Risk.Suproteem K. Sarkar; Kojin Oshiba; Daniel Giebisch; Yaron Singer Universal Adversarial Training.Ali Shafahi; Mahyar Najibi; Zheng Xu; John Dickerson; Larry S. Davis; Tom Goldstein Using Attribution to Decode Dataset Bias in Neural Network Models for Chemistry.Kevin McCloskey; Ankur Taly; Federico Monti; Michael P. Brenner; Lucy Colwell A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks.Jinghui Chen; Dongruo Zhou; Jinfeng Yi; Quanquan Gu 2018-11-26 ResNets Ensemble via the Feynman-Kac Formalism to Improve Natural and Robust Accuracies.Bao Wang; Binjie Yuan; Zuoqiang Shi; Stanley J. Osher Bilateral Adversarial Training: Towards Fast Training of More Robust Models Against Adversarial Attacks.Jianyu Wang; Haichao Zhang 2018-11-25 Is Data Clustering in Adversarial Settings Secure?Battista Biggio; Ignazio Pillai; Samuel Rota Bulò; Davide Ariu; Marcello Pelillo; Fabio Roli 2018-11-24 Attention, Please! Adversarial Defense via Attention Rectification and Preservation.Shangxi Wu; Jitao Sang; Kaiyuan Xu; Jiaming Zhang; Yanfeng Sun; Liping Jing; Jian Yu 2018-11-23 Robustness via curvature regularization, and vice versa.Seyed-Mohsen Moosavi-Dezfooli; Alhussein Fawzi; Jonathan Uesato; Pascal Frossard Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses.Jérôme Rony; Luiz G. Hafemann; Luiz S. Oliveira; Ismail Ben Ayed; Robert Sabourin; Eric Granger 2018-11-22 Parametric Noise Injection: Trainable Randomness to Improve Deep Neural Network Robustness against Adversarial Attack.Adnan Siraj Rakin; Zhezhi He; Deliang Fan Strength in Numbers: Trading-off Robustness and Computation via Adversarially-Trained Ensembles.Edward Grefenstette; Robert Stanforth; Brendan O'Donoghue; Jonathan Uesato; Grzegorz Swirszcz; Pushmeet Kohli Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces.Ziv Katzir; Yuval Elovici 2018-11-21 Task-generalizable Adversarial Attack based on Perceptual Metric.Muzammal Naseer; Salman H. Khan; Shafin Rahman; Fatih Porikli Towards Robust Neural Networks with Lipschitz Continuity.Muhammad Usama; Dong Eui Chang 2018-11-20 How the Softmax Output is Misleading for Evaluating the Strength of Adversarial Examples.Utku Ozbulak; Neve Wesley De; Messem Arnout Van MimicGAN: Corruption-Mimicking for Blind Image Recovery & Adversarial Defense.Rushil Anirudh; Jayaraman J. Thiagarajan; Bhavya Kailkhura; Timo Bremer Intermediate Level Adversarial Attack for Enhanced Transferability.Qian Huang; Zeqi Gu; Isay Katsman; Horace He; Pian Pawakapan; Zhiqiu Lin; Serge Belongie; Ser-Nam Lim Lightweight Lipschitz Margin Training for Certified Defense against Adversarial Examples.Hajime Ono; Tsubasa Takahashi; Kazuya Kakizaki Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition.Jenn-Bing Ong; Wee-Keong Ng; C. -C. Jay Kuo 2018-11-19 Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding.Yao Li; Martin Renqiang Min; Wenchao Yu; Cho-Jui Hsieh; Thomas C. M. Lee; Erik Kruus 2018-11-18 Generalizable Adversarial Training via Spectral Normalization.Farzan Farnia; Jesse M. Zhang; David Tse Regularized adversarial examples for model interpretability.Yoel Shoshan; Vadim Ratner The Taboo Trap: Behavioural Detection of Adversarial Samples.Ilia Shumailov; Yiren Zhao; Robert Mullins; Ross Anderson 2018-11-17 DeepConsensus: using the consensus of features from multiple layers to attain robust image classification.Yuchen Li; Safwan Hossain; Kiarash Jamali; Frank Rudzicz Classifiers Based on Deep Sparse Coding Architectures are Robust to Deep Learning Transferable Examples.Jacob M. Springer; Charles S. Strauss; Austin M. Thresher; Edward Kim; Garrett T. Kenyon Boosting the Robustness Verification of DNN by Identifying the Achilles's Heel.Chengdong Feng; Zhenbang Chen; Weijiang Hong; Hengbiao Yu; Wei Dong; Ji Wang 2018-11-16 Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues.Yuan Gong; Christian Poellabauer DARCCC: Detecting Adversaries by Reconstruction from Class Conditional Capsules.Nicholas Frosst; Sara Sabour; Geoffrey Hinton 2018-11-15 A Spectral View of Adversarially Robust Features.Shivam Garg; Vatsal Sharan; Brian Hu Zhang; Gregory Valiant A note on hyperparameters in black-box adversarial examples.Jamie Hayes Mathematical Analysis of Adversarial Attacks.Zehao Dou; Stanley J. Osher; Bao Wang Adversarial Examples from Cryptographic Pseudo-Random Generators.Sébastien Bubeck; Yin Tat Lee; Eric Price; Ilya Razenshteyn 2018-11-14 Verification of Recurrent Neural Networks Through Rule Extraction.Qinglong Wang; Kaixuan Zhang; Xue Liu; C. Lee Giles Robustness of spectral methods for community detection.Ludovic Stephan; Laurent Massoulié 2018-11-13 Deep Q learning for fooling neural networks.Mandar Kulkarni 2018-11-08 Universal Decision-Based Black-Box Perturbations: Breaking Security-Through-Obscurity Defenses.Thomas A. Hogan; Bhavya Kailkhura New CleverHans Feature: Better Adversarial Robustness Evaluations with Attack Bundling.Ian Goodfellow A Geometric Perspective on the Transferability of Adversarial Directions.Zachary Charles; Harrison Rosenberg; Dimitris Papailiopoulos 2018-11-07 CAAD 2018: Iterative Ensemble Adversarial Attack.Jiayang Liu; Weiming Zhang; Nenghai Yu AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning.Florian Tramèr; Pascal Dupré; Gili Rusak; Giancarlo Pellegrino; Dan Boneh 2018-11-06 MixTrain: Scalable Training of Verifiably Robust Neural Networks.Shiqi Wang; Yizheng Chen; Ahmed Abdou; Suman Jana SparseFool: a few pixels make a big difference.Apostolos Modas; Seyed-Mohsen Moosavi-Dezfooli; Pascal Frossard 2018-11-05 Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls.Yi Shi; Yalin E. Sagduyu; Kemal Davaslioglu; Jason H. Li FUNN: Flexible Unsupervised Neural Network.David Vigouroux; Sylvain Picard On the Transferability of Adversarial Examples Against CNN-Based Image Forensics.Mauro Barni; Kassem Kallas; Ehsan Nowroozi; Benedetta Tondi 2018-11-04 FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning.Faiq Khalid; Muhammmad Abdullah Hanif; Semeen Rehman; Junaid Qadir; Muhammad Shafique QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks.Faiq Khalid; Hassan Ali; Hammad Tariq; Muhammad Abdullah Hanif; Semeen Rehman; Rehan Ahmed; Muhammad Shafique SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters.Hassan Ali; Faiq Khalid; Hammad Tariq; Muhammad Abdullah Hanif; Semeen Rehman; Rehan Ahmed; Muhammad Shafique 2018-11-03 Adversarial Gain.Peter Henderson; Koustuv Sinha; Rosemary Nan Ke; Joelle Pineau CAAD 2018: Powerful None-Access Black-Box Attack Based on Adversarial Transformation Network.Xiaoyi Dong; Weiming Zhang; Nenghai Yu Adversarial Black-Box Attacks on Automatic Speech Recognition Systems using Multi-Objective Evolutionary Optimization.Shreya Khare; Rahul Aralikatte; Senthil Mani Learning to Defense by Learning to Attack.Haoming Jiang; Zhehui Chen; Yuyang Shi; Bo Dai; Tuo Zhao 2018-11-02 A Marauder's Map of Security and Privacy in Machine Learning.Nicolas Papernot Semidefinite relaxations for certifying robustness to adversarial examples.Aditi Raghunathan; Jacob Steinhardt; Percy Liang Efficient Neural Network Robustness Certification with General Activation Functions.Huan Zhang; Tsui-Wei Weng; Pin-Yu Chen; Cho-Jui Hsieh; Luca Daniel Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks.Davide Maiorca; Battista Biggio; Giorgio Giacinto TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks.Faiq Khalid; Muhammad Abdullah Hanif; Semeen Rehman; Rehan Ahmed; Muhammad Shafique 2018-11-01 Improving Adversarial Robustness by Encouraging Discriminative Features.Chirag Agarwal; Anh Nguyen; Dan Schonfeld On the Geometry of Adversarial Examples.Marc Khoury; Dylan Hadfield-Menell Excessive Invariance Causes Adversarial Vulnerability.Jörn-Henrik Jacobsen; Jens Behrmann; Richard Zemel; Matthias Bethge 2018-10-31 When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers.Yujia Wang; David J. Miller; George Kesidis Reversible Adversarial Examples.Jiayang Liu; Dongdong Hou; Weiming Zhang; Nenghai Yu 2018-10-30 Improved Network Robustness with Adversary Critic.Alexander Matyasko; Lap-Pui Chau On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models.Sven Gowal; Krishnamurthy Dvijotham; Robert Stanforth; Rudy Bunel; Chongli Qin; Jonathan Uesato; Relja Arandjelovic; Timothy Mann; Pushmeet Kohli 2018-10-29 Adversarial Risk and Robustness: General Definitions and Implications for the Uniform Distribution.Dimitrios I. Diochnos; Saeed Mahloujifar; Mohammad Mahmoody Logit Pairing Methods Can Fool Gradient-Based Attacks.Marius Mosbach; Maksym Andriushchenko; Thomas Trost; Matthias Hein; Dietrich Klakow 2018-10-28 RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications.Huan Zhang; Pengchuan Zhang; Cho-Jui Hsieh Rademacher Complexity for Adversarially Robust Generalization.Dong Yin; Kannan Ramchandran; Peter Bartlett Robust Audio Adversarial Example for a Physical Attack.Hiromu Yakura; Jun Sakuma 2018-10-27 Towards Robust Deep Neural Networks.Timothy E. Wang; Yiming Gu; Dhagash Mehta; Xiaojun Zhao; Edgar A. Bernal Regularization Effect of Fast Gradient Sign Method and its Generalization.Chandler Zuo 2018-10-26 Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples.Guanhong Tao; Shiqing Ma; Yingqi Liu; Xiangyu Zhang 2018-10-25 Law and Adversarial Machine Learning.Ram Shankar Siva Kumar; David R. O'Brien; Kendra Albert; Salome Vilojen Attack Graph Convolutional Networks by Adding Fake Nodes.Xiaoyun Wang; Minhao Cheng; Joe Eaton; Cho-Jui Hsieh; Felix Wu Evading classifiers in discrete domains with provable optimality guarantees.Bogdan Kulynych; Jamie Hayes; Nikita Samarin; Carmela Troncoso 2018-10-24 Robust Adversarial Learning via Sparsifying Front Ends.Soorya Gopalakrishnan; Zhinus Marzi; Upamanyu Madhow; Ramtin Pedarsani 2018-10-23 Stochastic Substitute Training: A Gray-box Approach to Craft Adversarial Examples Against Gradient Obfuscation Defenses.Mohammad Hashemi; Greg Cusack; Eric Keller One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy.Jingkang Wang; Ruoxi Jia; Gerald Friedland; Bo Li; Costas Spanos Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors.Yanzi Zhu; Zhujun Xiao; Yuxin Chen; Zhijing Li; Max Liu; Ben Y. Zhao; Haitao Zheng 2018-10-22 Adversarial Risk Bounds via Function Transformation.Justin Khim; Po-Ling Loh Cost-Sensitive Robustness against Adversarial Examples.Xiao Zhang; David Evans Sparse DNNs with Improved Adversarial Robustness.Yiwen Guo; Chao Zhang; Changshui Zhang; Yurong Chen 2018-10-19 On Extensions of CLEVER: A Neural Network Robustness Evaluation Algorithm.Tsui-Wei Weng; Huan Zhang; Pin-Yu Chen; Aurelie Lozano; Cho-Jui Hsieh; Luca Daniel 2018-10-18 Exploring Adversarial Examples in Malware Detection.Octavian Suciu; Scott E. Coull; Jeffrey Johns A Training-based Identification Approach to VIN Adversarial Examples.Yingdi Wang; Wenjia Niu; Tong Chen; Yingxiao Xiang; Jingjing Liu; Gang Li; Jiqiang Liu 2018-10-17 Provable Robustness of ReLU networks via Maximization of Linear Regions.Francesco University of Tübingen Croce; Maksym Saarland University Andriushchenko; Matthias University of Tübingen Hein 2018-10-16 Projecting Trouble: Light Based Adversarial Attacks on Deep Learning Classifiers.Nicole Nichols; Robert Jasper Security Matters: A Survey on Adversarial Machine Learning.Guofu Li; Pengjia Zhu; Jin Li; Zhemin Yang; Ning Cao; Zhiyi Chen 2018-10-15 Concise Explanations of Neural Networks using Adversarial Training.Prasad Chalasani; Jiefeng Chen; Amrita Roy Chowdhury; Somesh Jha; Xi Wu 2018-10-11 Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation.Chaowei Xiao; Ruizhi Deng; Bo Li; Fisher Yu; Mingyan Liu; Dawn Song MeshAdv: Adversarial Meshes for Visual Recognition.Chaowei Xiao; Dawei Yang; Bo Li; Jia Deng; Mingyan Liu 2018-10-09 Is PGD-Adversarial Training Necessary? Alternative Training via a Soft-Quantization Network with Noisy-Natural Samples Only.Tianhang Zheng; Changyou Chen; Kui Ren Analyzing the Noise Robustness of Deep Neural Networks.Mengchen Liu; Shixia Liu; Hang Su; Kelei Cao; Jun Zhu The Adversarial Attack and Detection under the Fisher Information Metric.Chenxiao Zhao; P. Thomas Fletcher; Mixue Yu; Yaxin Peng; Guixu Zhang; Chaomin Shen 2018-10-08 Limitations of adversarial robustness: strong No Free Lunch Theorem.Elvis Dohmatob Efficient Two-Step Adversarial Defense for Deep Neural Networks.Ting-Jui Chang; Yukun He; Peng Li Combinatorial Attacks on Binarized Neural Networks.Elias B. Khalil; Amrita Gupta; Bistra Dilkina Average Margin Regularization for Classifiers.Matt Olfat; Anil Aswani 2018-10-04 Feature Prioritization and Regularization Improve Standard Accuracy and Adversarial Robustness.Chihuang Liu; Joseph JaJa Improved Generalization Bounds for Robust Learning.Idan Attias; Aryeh Kontorovich; Yishay Mansour 2018-10-02 Can Adversarially Robust Learning Leverage Computational Hardness?Saeed Mahloujifar; Mohammad Mahmoody Adversarial Examples - A Complete Characterisation of the Phenomenon.Alexandru Constantin Serban; Erik Poll; Joost Visser Link Prediction Adversarial Attack.Jinyin Chen; Ziqiang Shi; Yangyang Wu; Xuanheng Xu; Haibin Zheng 2018-10-01 Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network.Xuanqing Liu; Yao Li; Chongruo Wu; Cho-Jui Hsieh Improving the Generalization of Adversarial Training with Domain Adaptation.Chuanbiao Song; Kun He; Liwei Wang; John E. Hopcroft Large batch size training of neural networks with adversarial training and second-order information.Zhewei Yao; Amir Gholami; Daiyaan Arfeen; Richard Liaw; Joseph Gonzalez; Kurt Keutzer; Michael Mahoney Improved robustness to adversarial examples using Lipschitz regularization of the loss.Chris Finlay; Adam Oberman; Bilal Abbasi 2018-09-30 Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks.Kenneth T. Co; Luis Muñoz-González; Maupeou Sixte de; Emil C. Lupu 2018-09-29 CAAD 2018: Generating Transferable Adversarial Examples.Yash Sharma; Tien-Dung Le; Moustafa Alzantot Interpreting Adversarial Robustness: A View from Decision Surface in Input Space.Fuxun Yu; Chenchen Liu; Yanzhi Wang; Liang Zhao; Xiang Chen To compress or not to compress: Understanding the Interactions between Adversarial Attacks and Neural Network Compression.Yiren Zhao; Ilia Shumailov; Robert Mullins; Ross Anderson 2018-09-28 Characterizing Audio Adversarial Examples Using Temporal Dependency.Zhuolin Yang; Bo Li; Pin-Yu Chen; Dawn Song Adversarial Attacks and Defences: A Survey.Anirban Chakraborty; Manaar Alam; Vishal Dey; Anupam Chattopadhyay; Debdeep Mukhopadhyay Explainable Black-Box Attacks Against Model-based Authentication.Washington Garcia; Joseph I. Choi; Suman K. Adari; Somesh Jha; Kevin R. B. Butler 2018-09-26 Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward.Muhammad Usama; Junaid Qadir; Ala Al-Fuqaha 2018-09-24 Neural Networks with Structural Resistance to Adversarial Attacks.Alfaro Luca de Fast Geometrically-Perturbed Adversarial Faces.Ali Dabouei; Sobhan Soleymani; Jeremy Dawson; Nasser M. Nasrabadi On The Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces.Chia-Yi Hsu; Pei-Hsuan Lu; Pin-Yu Chen; Chia-Mu Yu Low Frequency Adversarial Perturbation.Chuan Guo; Jared S. Frank; Kilian Q. Weinberger 2018-09-23 Is Ordered Weighted $\ell_1$ Regularized Regression Robust to Adversarial Perturbation? A Case Study on OSCAR.Pin-Yu Chen; Bhanukiran Vinzamuri; Sijia Liu 2018-09-22 Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization.Bao Wang; Alex T. Lin; Wei Zhu; Penghang Yin; Andrea L. Bertozzi; Stanley J. Osher 2018-09-21 Unrestricted Adversarial Examples.Tom B. Brown; Nicholas Carlini; Chiyuan Zhang; Catherine Olsson; Paul Christiano; Ian Goodfellow Adversarial Binaries for Authorship Identification.Xiaozhu Meng; Barton P. Miller; Somesh Jha 2018-09-20 Playing the Game of Universal Adversarial Perturbations.Julien Perolat; Mateusz Malinowski; Bilal Piot; Olivier Pietquin 2018-09-19 Efficient Formal Safety Analysis of Neural Networks.Shiqi Wang; Kexin Pei; Justin Whitehouse; Junfeng Yang; Suman Jana Adversarial Training Towards Robust Multimedia Recommender System.Jinhui Tang; Xiaoyu Du; Xiangnan He; Fajie Yuan; Qi Tian; Tat-Seng Chua Generating 3D Adversarial Point Clouds.Chong Xiang; Charles R. Qi; Bo Li 2018-09-17 HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples.Deqiang Li; Ramesh Baral; Tao Li; Han Wang; Qianmu Li; Shouhuai Xu Robustness Guarantees for Bayesian Inference with Gaussian Processes.Luca Cardelli; Marta Kwiatkowska; Luca Laurenti; Andrea Patane 2018-09-16 Exploring the Vulnerability of Single Shot Module in Object Detectors via Imperceptible Background Patches.Yuezun Li; Xiao Bian; Ming-ching Chang; Siwei Lyu Robust Adversarial Perturbation on Deep Proposal-based Models.Yuezun Li; Daniel Tian; Ming-Ching Chang; Xiao Bian; Siwei Lyu 2018-09-13 Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks.Siyue Wang; Xiao Wang; Pu Zhao; Wujie Wen; David Kaeli; Peter Chin; Xue Lin Query-Efficient Black-Box Attack by Active Learning.Pengcheng Li; Jinfeng Yi; Lijun Zhang Adversarial Examples: Opportunities and Challenges.Jiliang Zhang; Chen Li 2018-09-11 On the Structural Sensitivity of Deep Convolutional Networks to the Directions of Fourier Basis Functions.Yusuke Tsuzuku; Issei Sato Isolated and Ensemble Audio Preprocessing Methods for Detecting Adversarial Examples against Automatic Speech Recognition.Krishan Rajaratnam; Kunal Shah; Jugal Kalita Humans can decipher adversarial images.Zhenglong Zhou; Chaz Firestone 2018-09-09 The Curse of Concentration in Robust Learning: Evasion and Poisoning Attacks from Concentration of Measure.Saeed Mahloujifar; Dimitrios I. Diochnos; Mohammad Mahmoody Training for Faster Adversarial Robustness Verification via Inducing ReLU Stability.Kai Y. Xiao; Vincent Tjeng; Nur Muhammad Shafiullah; Aleksander Madry Certified Adversarial Robustness with Additive Noise.Bai Li; Changyou Chen; Wenlin Wang; Lawrence Carin 2018-09-08 Towards Query Efficient Black-box Attacks: An Input-free Perspective.Yali Du; Meng Fang; Jinfeng Yi; Jun Cheng; Dacheng Tao Fast Gradient Attack on Network Embedding.Jinyin Chen; Yangyang Wu; Xuanheng Xu; Yixian Chen; Haibin Zheng; Qi Xuan Structure-Preserving Transformation: Generating Diverse and Transferable Adversarial Examples.Dan Peng; Zizhan Zheng; Xiaofeng Zhang Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks.Ambra Demontis; Marco Melis; Maura Pintor; Matthew Jagielski; Battista Biggio; Alina Oprea; Cristina Nita-Rotaru; Fabio Roli 2018-09-07 A Deeper Look at 3D Shape Classifiers.Jong-Chyi Su; Matheus Gadelha; Rui Wang; Subhransu Maji Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer.Alvin Chan; Lei Ma; Felix Juefei-Xu; Xiaofei Xie; Yang Liu; Yew Soon Ong Trick Me If You Can: Human-in-the-loop Generation of Adversarial Examples for Question Answering.Eric Wallace; Pedro Rodriguez; Shi Feng; Ikuya Yamada; Jordan Boyd-Graber Query Attack via Opposite-Direction Feature:Towards Robust Image Retrieval.Zhedong Zheng; Liang Zheng; Yi Yang; Fei Wu 2018-09-06 Adversarial Over-Sensitivity and Over-Stability Strategies for Dialogue Models.Tong Niu; Mohit Bansal Are adversarial examples inevitable?Ali Shafahi; W. Ronny Huang; Christoph Studer; Soheil Feizi; Tom Goldstein IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection.Zilong Lin; Yong Shi; Zhi Xue Adversarial Reprogramming of Text Classification Neural Networks.Paarth Neekhara; Shehzeen Hussain; Shlomo Dubnov; Farinaz Koushanfar 2018-09-05 Bridging machine learning and cryptography in defence against adversarial attacks.Olga Taran; Shideh Rezaeifar; Slava Voloshynovskiy 2018-09-04 Adversarial Attacks on Node Embeddings.Aleksandar Bojchevski; Stephan Günnemann 2018-09-03 HASP: A High-Performance Adaptive Mobile Security Enhancement Against Malicious Speech Recognition.Zirui Xu; Fuxun Yu; Chenchen Liu; Xiang Chen Adversarial Attack Type I: Cheat Classifiers by Significant Changes.Sanli Tang; Xiaolin Huang; Mingjian Chen; Chengjin Sun; Jie Yang 2018-08-31 MULDEF: Multi-model-based Defense Against Adversarial Examples for Neural Networks.Siwakorn Srisakaokul; Yuhao Zhang; Zexuan Zhong; Wei Yang; Tao Xie; Bo Li 2018-08-28 DLFuzz: Differential Fuzzing Testing of Deep Learning Systems.Jianmin Guo; Yu Jiang; Yue Zhao; Quan Chen; Jiaguang Sun All You Need is "Love": Evading Hate-speech Detection.Tommi Gröndahl; Luca Pajola; Mika Juuti; Mauro Conti; N. Asokan Lipschitz regularized Deep Neural Networks generalize and are adversarially robust.Chris Finlay; Jeff Calder; Bilal Abbasi; Adam Oberman 2018-08-27 Targeted Nonlinear Adversarial Perturbations in Images and Videos.Roberto Rey-de-Castro; Herschel Rabitz Generalisation in humans and deep neural networks.Robert Geirhos; Carlos R. Medina Temme; Jonas Rauber; Heiko H. Schütt; Matthias Bethge; Felix A. Wichmann 2018-08-26 Adversarially Regularising Neural NLI Models to Integrate Logical Background Knowledge.Pasquale Minervini; Sebastian Riedel 2018-08-25 Guiding Deep Learning System Testing using Surprise Adequacy.Jinhan Kim; Robert Feldt; Shin Yoo Analysis of adversarial attacks against CNN-based image forgery detectors.Diego Gragnaniello; Francesco Marra; Giovanni Poggi; Luisa Verdoliva 2018-08-24 Is Machine Learning in Power Systems Vulnerable?Yize Chen; Yushi Tan; Deepjyoti Deka 2018-08-23 Maximal Jacobian-based Saliency Map Attack.Rey Wiyatno; Anqi Xu Adversarial Attacks on Deep-Learning Based Radio Signal Classification.Meysam Sadeghi; Erik G. Larsson 2018-08-20 Controlling Over-generalization and its Effect on Adversarial Examples Generation and Detection.Mahdieh Abbasi; Arezoo Rajabi; Azadeh Sadat Mozafari; Rakesh B. Bobba; Christian Gagne Stochastic Combinatorial Ensembles for Defending Against Adversarial Examples.George A. Adam; Petr Smirnov; David Duvenaud; Benjamin Haibe-Kains; Anna Goldenberg 2018-08-17 Reinforcement Learning for Autonomous Defence in Software-Defined Networking.Yi Han; Benjamin I. P. Rubinstein; Tamas Abraham; Tansu Alpcan; Vel Olivier De; Sarah Erfani; David Hubczenko; Christopher Leckie; Paul Montague 2018-08-16 Mitigation of Adversarial Attacks through Embedded Feature Selection.Ziyi Bao; Luis Muñoz-González; Emil C. Lupu Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding.Lea Schönherr; Katharina Kohls; Steffen Zeiler; Thorsten Holz; Dorothea Kolossa Distributionally Adversarial Attack.Tianhang Zheng; Changyou Chen; Kui Ren 2018-08-10 Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection.Xiao Chen; Chaoran Li; Derui Wang; Sheng Wen; Jun Zhang; Surya Nepal; Yang Xiang; Kui Ren Using Randomness to Improve Robustness of Machine-Learning Models Against Evasion Attacks.Fan Yang; Zhiyuan Chen 2018-08-08 Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer.Hsueh-Ti Derek Liu; Michael Tao; Chun-Liang Li; Derek Nowrouzezahrai; Alec Jacobson 2018-08-07 Data augmentation using synthetic data for time series classification with deep residual networks.Hassan Ismail Fawaz; Germain Forestier; Jonathan Weber; Lhassane Idoumghar; Pierre-Alain Muller 2018-08-06 Adversarial Vision Challenge.Wieland Brendel; Jonas Rauber; Alexey Kurakin; Nicolas Papernot; Behar Veliqi; Marcel Salathé; Sharada P. Mohanty; Matthias Bethge Defense Against Adversarial Attacks with Saak Transform.Sibo Song; Yueru Chen; Ngai-Man Cheung; C. -C. Jay Kuo Gray-box Adversarial Training.Vivek B. S.; Konda Reddy Mopuri; R. Venkatesh Babu 2018-08-05 Is Robustness the Cost of Accuracy? -- A Comprehensive Study on the Robustness of 18 Deep Image Classification Models.Dong Su; Huan Zhang; Hongge Chen; Jinfeng Yi; Pin-Yu Chen; Yupeng Gao Structured Adversarial Attack: Towards General Implementation and Better Interpretability.Kaidi Xu; Sijia Liu; Pu Zhao; Pin-Yu Chen; Huan Zhang; Quanfu Fan; Deniz Erdogmus; Yanzhi Wang; Xue Lin 2018-08-04 Traits & Transferability of Adversarial Examples against Instance Segmentation & Object Detection.Raghav Gurbaxani; Shivank Mishra ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples.Xinbo Liu; Jiliang Zhang; Yaping Lin; He Li 2018-08-03 Ask, Acquire, and Attack: Data-free UAP Generation using Class Impressions.Konda Reddy Mopuri; Phani Krishna Uppala; R. Venkatesh Babu DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes.Mehmet Sinan Inci; Thomas Eisenbarth; Berk Sunar 2018-07-31 EagleEye: Attack-Agnostic Defense against Adversarial Inputs (Technical Report).Yujie Ji; Xinyang Zhang; Ting Wang 2018-07-27 Rob-GAN: Generator, Discriminator, and Adversarial Attacker.Xuanqing Liu; Cho-Jui Hsieh 2018-07-26 A general metric for identifying adversarial images.Siddharth Krishna Kumar Evaluating and Understanding the Robustness of Adversarial Logit Pairing.Logan Engstrom; Andrew Ilyas; Anish Athalye 2018-07-25 HiDDeN: Hiding Data With Deep Networks.Jiren Zhu; Russell Kaplan; Justin Johnson; Li Fei-Fei Limitations of the Lipschitz constant as a defense against adversarial examples.Todd Huster; Cho-Yu Jason Chiang; Ritu Chadha Unbounded Output Networks for Classification.Stefan Elfwing; Eiji Uchibe; Kenji Doya 2018-07-24 Contrastive Video Representation Learning via Adversarial Perturbations.Jue Wang; Anoop Cherian 2018-07-21 Simultaneous Adversarial Training - Learn from Others Mistakes.Zukang Liao 2018-07-20 Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors.Andrew Ilyas; Logan Engstrom; Aleksander Madry Physical Adversarial Examples for Object Detectors.Kevin Eykholt; Ivan Evtimov; Earlence Fernandes; Bo Li; Amir Rahmati; Florian Tramer; Atul Prakash; Tadayoshi Kohno; Dawn Song 2018-07-18 Harmonic Adversarial Attack Method.Wen Heng; Shuchang Zhou; Tingting Jiang 2018-07-17 Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding.Tong Chen; Wenjia Niu; Yingxiao Xiang; Xiaoxuan Bai; Jiqiang Liu; Zhen Han; Gang Li Motivating the Rules of the Game for Adversarial Example Research.Justin Gilmer; Ryan P. Adams; Ian Goodfellow; David Andersen; George E. Dahl Defend Deep Neural Networks Against Adversarial Examples via Fixed and Dynamic Quantized Activation Functions.Adnan Siraj Rakin; Jinfeng Yi; Boqing Gong; Deliang Fan 2018-07-16 Online Robust Policy Learning in the Presence of Unknown Adversaries.Aaron J. Havens; Zhanhong Jiang; Soumik Sarkar Manifold Adversarial Learning.Shufei Zhang; Kaizhu Huang; Jianke Zhu; Yang Liu 2018-07-12 Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach.Minhao Cheng; Thong Le; Pin-Yu Chen; Jinfeng Yi; Huan Zhang; Cho-Jui Hsieh 2018-07-11 With Friends Like These, Who Needs Adversaries?Saumya Jetley; Nicholas A. Lord; Philip H. S. Torr 2018-07-10 A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks.Kimin Lee; Kibok Lee; Honglak Lee; Jinwoo Shin A Game-Based Approximate Verification of Deep Neural Networks with Provable Guarantees.Min Wu; Matthew Wicker; Wenjie Ruan; Xiaowei Huang; Marta Kwiatkowska Attack and defence in cellular decision-making: lessons from machine learning.Thomas J. Rademaker; Emmanuel Bengio; Paul François 2018-07-09 Adaptive Adversarial Attack on Scene Text Recognition.Xiaoyong Yuan; Pan He; Xiaolin Andy Li; Dapeng Oliver Wu 2018-07-08 Vulnerability Analysis of Chest X-Ray Image Classification Against Adversarial Attacks.Saeid Asgari Taghanaki; Arkadeep Das; Ghassan Hamarneh 2018-07-05 Implicit Generative Modeling of Random Noise during Training for Adversarial Robustness.Priyadarshini Panda; Kaushik Roy 2018-07-04 Benchmarking Neural Network Robustness to Common Corruptions and Surface Variations.Dan Hendrycks; Thomas G. Dietterich 2018-07-03 Local Gradients Smoothing: Defense against localized adversarial attacks.Muzammal Naseer; Salman H. Khan; Fatih Porikli Adversarial Robustness Toolbox v1.0.0.Maria-Irina Nicolae; Mathieu Sinn; Minh Ngoc Tran; Beat Buesser; Ambrish Rawat; Martin Wistuba; Valentina Zantedeschi; Nathalie Baracaldo; Bryant Chen; Heiko Ludwig; Ian M. Molloy; Ben Edwards 2018-07-02 Adversarial Perturbations Against Real-Time Video Classification Systems.Shasha Li; Ajaya Neupane; Sujoy Paul; Chengyu Song; Srikanth V. Krishnamurthy; Amit K. Roy Chowdhury; Ananthram Swami 2018-07-01 Towards Adversarial Training with Moderate Performance Improvement for Neural Network Classification.Xinhan Di; Pengqian Yu; Meng Tian 2018-06-29 Adversarial Examples in Deep Learning: Characterization and Divergence.Wenqi Wei; Ling Liu; Margaret Loper; Stacey Truex; Lei Yu; Mehmet Emre Gursoy; Yanzhao Wu 2018-06-28 Adversarial Reprogramming of Neural Networks.Gamaleldin F. Elsayed; Ian Goodfellow; Jascha Sohl-Dickstein 2018-06-27 Gradient Similarity: An Explainable Approach to Detect Adversarial Attacks against Deep Learning.Jasjeet Dhaliwal; Saurabh Shintre Customizing an Adversarial Example Generator with Class-Conditional GANs.Shih-hong Tsai 2018-06-25 Exploring Adversarial Examples: Patterns of One-Pixel Attacks.David Kügler; Alexander Distergoft; Arjan Kuijper; Anirban Mukhopadhyay 2018-06-23 Defending Malware Classification Networks Against Adversarial Perturbations with Non-Negative Weight Restrictions.Alex Kouzemtchenko On Adversarial Examples for Character-Level Neural Machine Translation.Javid Ebrahimi; Daniel Lowd; Dejing Dou Evaluation of Momentum Diverse Input Iterative Fast Gradient Sign Method (M-DI2-FGSM) Based Attack Method on MCS 2018 Adversarial Attacks on Black Box Face Recognition System.Md Ashraful Alam Milton 2018-06-21 Detection based Defense against Adversarial Examples from the Steganalysis Point of View.Jiayang Liu; Weiming Zhang; Yiwei Zhang; Dongdong Hou; Yujia Liu; Hongyue Zha; Nenghai Yu 2018-06-20 Gradient Adversarial Training of Neural Networks.Ayan Sinha; Zhao Chen; Vijay Badrinarayanan; Andrew Rabinovich Combinatorial Testing for Deep Learning Systems.Lei Ma; Fuyuan Zhang; Minhui Xue; Bo Li; Yang Liu; Jianjun Zhao; Yadong Wang 2018-06-19 On the Learning of Deep Local Features for Robust Face Spoofing Detection.Souza Gustavo Botelho de; João Paulo Papa; Aparecido Nilceu Marana Built-in Vulnerabilities to Imperceptible Adversarial Perturbations.Thomas Tanay; Jerone T. A. Andrews; Lewis D. Griffin 2018-06-15 Non-Negative Networks Against Adversarial Attacks.William Fleshman; Edward Raff; Jared Sylvester; Steven Forsyth; Mark McLean 2018-06-14 Copycat CNN: Stealing Knowledge by Persuading Confession with Random Non-Labeled Data.Jacson Rodrigues Correia-Silva; Rodrigo F. Berriel; Claudine Badue; Souza Alberto F. de; Thiago Oliveira-Santos 2018-06-13 Hierarchical interpretations for neural network predictions.Chandan Singh; W. James Murdoch; Bin Yu Manifold Mixup: Better Representations by Interpolating Hidden States.Vikas Verma; Alex Lamb; Christopher Beckham; Amir Najafi; Ioannis Mitliagkas; Aaron Courville; David Lopez-Paz; Yoshua Bengio 2018-06-12 Adversarial Attacks on Variational Autoencoders.George Gondim-Ribeiro; Pedro Tabacof; Eduardo Valle Ranking Robustness Under Adversarial Document Manipulations.Gregory Goren; Oren Kurland; Moshe Tennenholtz; Fiana Raiber 2018-06-11 Defense Against the Dark Arts: An overview of adversarial example security research and future research directions.Ian Goodfellow 2018-06-08 Monge blunts Bayes: Hardness Results for Adversarial Training.Zac Cranko; Aditya Krishna Menon; Richard Nock; Cheng Soon Ong; Zhan Shi; Christian Walder 2018-06-07 Revisiting Adversarial Risk.Arun Sai Suggala; Adarsh Prasad; Vaishnavh Nagarajan; Pradeep Ravikumar Training Augmentation with Adversarial Examples for Robust Speech Recognition.Sining Sun; Ching-Feng Yeh; Mari Ostendorf; Mei-Yuh Hwang; Lei Xie 2018-06-06 Adversarial Attack on Graph Structured Data.Hanjun Dai; Hui Li; Tian Tian; Xin Huang; Lin Wang; Jun Zhu; Le Song Adversarial Regression with Multiple Learners.Liang Tong; Sixie Yu; Scott Alfeld; Yevgeniy Vorobeychik Killing four birds with one Gaussian process: the relation between different test-time attacks.Kathrin Grosse; Michael T. Smith; Michael Backes 2018-06-05 DPatch: An Adversarial Patch Attack on Object Detectors.Xin Liu; Huanrui Yang; Ziwei Liu; Linghao Song; Hai Li; Yiran Chen 2018-06-04 Mitigation of Policy Manipulation Attacks on Deep Q-Networks with Parameter-Space Noise.Vahid Behzadan; Arslan Munir An Explainable Adversarial Robustness Metric for Deep Learning Neural Networks.Chirag Agarwal; Bo Dong; Dan Schonfeld; Anthony Hoogs PAC-learning in the presence of evasion adversaries.Daniel Cullina; Arjun Nitin Bhagoji; Prateek Mittal 2018-06-02 Sufficient Conditions for Idealised Models to Have No Adversarial Examples: a Theoretical and Empirical Study with Bayesian Neural Networks.Yarin Gal; Lewis Smith Detecting Adversarial Examples via Key-based Network.Pinlong Zhao; Zhouyu Fu; Ou wu; Qinghua Hu; Jun Wang 2018-05-31 PeerNets: Exploiting Peer Wisdom Against Adversarial Attacks.Jan Svoboda; Jonathan Masci; Federico Monti; Michael M. Bronstein; Leonidas Guibas Resisting Adversarial Attacks using Gaussian Mixture Variational Autoencoders.Partha Ghosh; Arpan Losalka; Michael J Black Scaling provable adversarial defenses.Eric Wong; Frank R. Schmidt; Jan Hendrik Metzen; J. Zico Kolter Sequential Attacks on Agents for Long-Term Adversarial Goals.Edgar Tretschk; Seong Joon Oh; Mario Fritz Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data.Puyudi Yang; Jianbo Chen; Cho-Jui Hsieh; Jane-Ling Wang; Michael I. Jordan 2018-05-30 Adversarial Attacks on Face Detectors using Neural Net based Constrained Optimization.Avishek Joey Bose; Parham Aarabi ADAGIO: Interactive Experimentation with Adversarial Attack and Defense for Audio.Nilaksh Das; Madhuri Shanbhogue; Shang-Tse Chen; Li Chen; Michael E. Kounavis; Duen Horng Chau Robustifying Models Against Adversarial Attacks by Langevin Dynamics.Vignesh Srinivasan; Arturo Marban; Klaus-Robert Müller; Wojciech Samek; Shinichi Nakajima Robustness May Be at Odds with Accuracy.Dimitris Tsipras; Shibani Santurkar; Logan Engstrom; Alexander Turner; Aleksander Madry 2018-05-29 AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks.Chun-Chen Tu; Paishun Ting; Pin-Yu Chen; Sijia Liu; Huan Zhang; Jinfeng Yi; Cho-Jui Hsieh; Shin-Ming Cheng Adversarial Noise Attacks of Deep Learning Architectures -- Stability Analysis via Sparse Modeled Signals.Yaniv Romano; Aviad Aberdam; Jeremias Sulam; Michael Elad Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization.Salman Salamatian; Wasim Huleihel; Ahmad Beirami; Asaf Cohen; Muriel Médard 2018-05-28 Adversarial Examples in Remote Sensing.Wojciech Czaja; Neil Fendley; Michael Pekala; Christopher Ratto; I-Jeng Wang GenAttack: Practical Black-box Attacks with Gradient-Free Optimization.Moustafa Alzantot; Yash Sharma; Supriyo Chakraborty; Huan Zhang; Cho-Jui Hsieh; Mani Srivastava 2018-05-27 Defending Against Adversarial Attacks by Leveraging an Entire GAN.Gokula Krishnan Santhanam; Paulina Grnarova 2018-05-25 Training verified learners with learned verifiers.Krishnamurthy Dvijotham; Sven Gowal; Robert Stanforth; Relja Arandjelovic; Brendan O'Donoghue; Jonathan Uesato; Pushmeet Kohli Adversarial examples from computational constraints.Sébastien Bubeck; Eric Price; Ilya Razenshteyn 2018-05-24 Laplacian Networks: Bounding Indicator Function Smoothness for Neural Network Robustness.Carlos Eduardo Rosar Kos Lassance; Vincent Gripon; Antonio Ortega 2018-05-23 Anonymizing k-Facial Attributes via Adversarial Perturbations.Saheb Chhabra; Richa Singh; Mayank Vatsa; Gaurav Gupta Towards Robust Training of Neural Networks by Regularizing Adversarial Gradients.Fuxun Yu; Zirui Xu; Yanzhi Wang; Chenchen Liu; Xiang Chen Towards the first adversarially robust neural network model on MNIST.Lukas Schott; Jonas Rauber; Matthias Bethge; Wieland Brendel 2018-05-22 Adversarially Robust Training through Structured Gradient Regularization.Kevin Roth; Aurelien Lucchi; Sebastian Nowozin; Thomas Hofmann 2018-05-21 Adversarial Noise Layer: Regularize Neural Network By Adding Noise.Zhonghui You; Jinmian Ye; Kunming Li; Zenglin Xu; Ping Wang Adversarial Attacks on Neural Networks for Graph Data.Daniel Zügner; Amir Akbarnejad; Stephan Günnemann Constructing Unrestricted Adversarial Examples with Generative Models.Yang Song; Rui Shu; Nate Kushman; Stefano Ermon Bidirectional Learning for Robust Neural Networks.Sidney Pontes-Filho; Marcus Liwicki 2018-05-20 Featurized Bidirectional GAN: Adversarial Defense via Adversarially Learned Semantic Inference.Ruying Bao; Sihang Liang; Qingcan Wang Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks.Jiefeng Chen; Xi Wu; Vaibhav Rastogi; Yingyu Liang; Somesh Jha Targeted Adversarial Examples for Black Box Audio Systems.Rohan Taori; Amog Kamsetty; Brenton Chu; Nikita Vemuri 2018-05-17 Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models.Pouya Samangouei; Maya Kabkab; Rama Chellappa 2018-05-16 Towards Robust Neural Machine Translation.Yong Cheng; Zhaopeng Tu; Fandong Meng; Junjie Zhai; Yang Liu 2018-05-14 Detecting Adversarial Samples for Deep Neural Networks through Mutation Testing.Jingyi Wang; Jun Sun; Peixin Zhang; Xinyu Wang 2018-05-12 Curriculum Adversarial Training.Qi-Zhi Cai; Min Du; Chang Liu; Dawn Song AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.Jinyuan Jia; Neil Zhenqiang Gong 2018-05-11 Breaking Transferability of Adversarial Samples with Randomness.Yan Zhou; Murat Kantarcioglu; Bowei Xi 2018-05-09 On Visual Hallmarks of Robustness to Adversarial Malware.Alex Huang; Abdullah Al-Dujaili; Erik Hemberg; Una-May O'Reilly Robust Classification with Convolutional Prototype Learning.Hong-Ming Yang; Xu-Yao Zhang; Fei Yin; Cheng-Lin Liu 2018-05-08 Interpretable Adversarial Perturbation in Input Embedding Space for Text.Motoki Sato; Jun Suzuki; Hiroyuki Shindo; Yuji Matsumoto 2018-05-05 A Counter-Forensic Method for CNN-Based Camera Model Identification.David Güera; Yu Wang; Luca Bondi; Paolo Bestagini; Stefano Tubaro; Edward J. Delp 2018-05-03 Siamese networks for generating adversarial examples.Mandar Kulkarni; Aria Abubakar 2018-04-30 Concolic Testing for Deep Neural Networks.Youcheng Sun; Min Wu; Wenjie Ruan; Xiaowei Huang; Marta Kwiatkowska; Daniel Kroening How Robust are Deep Neural Networks?Biswa Sengupta; Karl J. Friston Adversarially Robust Generalization Requires More Data.Ludwig Schmidt; Shibani Santurkar; Dimitris Tsipras; Kunal Talwar; Aleksander Mądry 2018-04-29 Adversarial Regression for Detecting Attacks in Cyber-Physical Systems.Amin Ghafouri; Yevgeniy Vorobeychik; Xenofon Koutsoukos 2018-04-28 Formal Security Analysis of Neural Networks using Symbolic Intervals.Shiqi Wang; Kexin Pei; Justin Whitehouse; Junfeng Yang; Suman Jana 2018-04-25 Towards Fast Computation of Certified Robustness for ReLU Networks.Tsui-Wei Weng; Huan Zhang; Hongge Chen; Zhao Song; Cho-Jui Hsieh; Duane Boning; Inderjit S. Dhillon; Luca Daniel 2018-04-23 Towards Dependable Deep Convolutional Neural Networks (CNNs) with Out-distribution Learning.Mahdieh Abbasi; Arezoo Rajabi; Christian Gagné; Rakesh B. Bobba Siamese Generative Adversarial Privatizer for Biometric Data.Witold Oleszkiewicz; Peter Kairouz; Karol Piczak; Ram Rajagopal; Tomasz Trzcinski Black-box Adversarial Attacks with Limited Queries and Information.Andrew Ilyas; Logan Engstrom; Anish Athalye; Jessy Lin VectorDefense: Vectorization as a Defense to Adversarial Examples.Vishaal Munusamy Kabilan; Brandon Morris; Anh Nguyen Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers.Ishai Rosenberg; Asaf Shabtai; Yuval Elovici; Lior Rokach 2018-04-21 Generating Natural Language Adversarial Examples.Moustafa Alzantot; Yash Sharma; Ahmed Elgohary; Bo-Jhang Ho; Mani Srivastava; Kai-Wei Chang 2018-04-20 Gradient Masking Causes CLEVER to Overestimate Adversarial Perturbation Size.Ian Goodfellow Learning More Robust Features with Adversarial Training.Shuangtao Li; Yuanke Chen; Yanlin Peng; Lin Bai ADef: an Iterative Algorithm to Construct Adversarial Deformations.Rima Alaifari; Giovanni S. Alberti; Tandri Gauksson 2018-04-19 Attacking Convolutional Neural Network using Differential Evolution.Jiawei Su; Danilo Vasconcellos Vargas; Kouichi Sakurai Semantic Adversarial Deep Learning.Tommaso Dreossi; Somesh Jha; Sanjit A. Seshia 2018-04-18 Simulation-based Adversarial Test Generation for Autonomous Vehicles with Machine Learning Components.Cumhur Erkan Tuncali; Georgios Fainekos; Hisahiro Ito; James Kapinski Neural Automated Essay Scoring and Coherence Modeling for Adversarially Crafted Input.Youmna Farag; Helen Yannakoudakis; Ted Briscoe 2018-04-17 Robust Machine Comprehension Models via Adversarial Training.Yicheng Wang; Mohit Bansal Adversarial Example Generation with Syntactically Controlled Paraphrase Networks.Mohit Iyyer; John Wieting; Kevin Gimpel; Luke Zettlemoyer 2018-04-16 Global Robustness Evaluation of Deep Neural Networks with Provable Guarantees for the $L_0$ Norm.Wenjie Ruan; Min Wu; Youcheng Sun; Xiaowei Huang; Daniel Kroening; Marta Kwiatkowska ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector.Shang-Tse Chen; Cory Cornelius; Jason Martin; Duen Horng Chau 2018-04-14 On the Limitation of MagNet Defense against $L_1$-based Adversarial Examples.Pei-Hsuan Lu; Pin-Yu Chen; Kang-Cheng Chen; Chia-Mu Yu Adversarial Attacks Against Medical Deep Learning Systems.Samuel G. Finlayson; Hyung Won Chung; Isaac S. Kohane; Andrew L. Beam 2018-04-11 Detecting Malicious PowerShell Commands using Deep Neural Networks.Danny Hendler; Shay Kels; Amir Rubin 2018-04-10 On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses.Anish Athalye; Nicholas Carlini 2018-04-09 Adversarial Training Versus Weight Decay.Angus Galloway; Thomas Tanay; Graham W. Taylor An ADMM-Based Universal Framework for Adversarial Attacks on Deep Neural Networks.Pu Zhao; Sijia Liu; Yanzhi Wang; Xue Lin 2018-04-08 Adaptive Spatial Steganography Based on Probability-Controlled Adversarial Examples.Sai Ma; Qingxiao Guan; Xianfeng Zhao; Yaqi Liu 2018-04-06 Fortified Networks: Improving the Robustness of Deep Networks by Modeling the Manifold of Hidden Representations.Alex Lamb; Jonathan Binas; Anirudh Goyal; Dmitriy Serdyuk; Sandeep Subramanian; Ioannis Mitliagkas; Yoshua Bengio 2018-04-04 Unifying Bilateral Filtering and Adversarial Training for Robust Neural Networks.Neale Ratzlaff; Li Fuxin 2018-03-30 Adversarial Attacks and Defences Competition.Alexey Kurakin; Ian Goodfellow; Samy Bengio; Yinpeng Dong; Fangzhou Liao; Ming Liang; Tianyu Pang; Jun Zhu; Xiaolin Hu; Cihang Xie; Jianyu Wang; Zhishuai Zhang; Zhou Ren; Alan Yuille; Sangxia Huang; Yao Zhao; Yuzhe Zhao; Zhonglin Han; Junjiajia Long; Yerkebulan Berdibekov; Takuya Akiba; Seiya Tokui; Motoki Abe 2018-03-29 Security Consideration For Deep Learning-Based Image Forensics.Wei Zhao; Pengpeng Yang; Rongrong Ni; Yao Zhao; Haorui Wu 2018-03-28 Defending against Adversarial Images using Basis Functions Transformations.Uri Shaham; James Garritano; Yutaro Yamada; Ethan Weinberger; Alex Cloninger; Xiuyuan Cheng; Kelly Stanton; Yuval Kluger The Effects of JPEG and JPEG2000 Compression on Attacks using Adversarial Examples.Ayse Elvan Aydemir; Alptekin Temizel; Tugba Taskaya Temizel 2018-03-26 Bypassing Feature Squeezing by Increasing Adversary Strength.Yash Sharma; Pin-Yu Chen On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples.Pei-Hsuan Lu; Pin-Yu Chen; Chia-Mu Yu Clipping free attacks against artificial neural networks.Boussad Addad; Jerome Kodjabachian; Christophe Meyer 2018-03-24 Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks.Tegjyot Singh Sethi; Mehmed Kantardzic; Joung Woo Ryu A Dynamic-Adversarial Mining Approach to the Security of Machine Learning.Tegjyot Singh Sethi; Mehmed Kantardzic; Lingyu Lyua; Jiashun Chen An Overview of Vulnerabilities of Voice Controlled Systems.Yuan Gong; Christian Poellabauer 2018-03-23 Generalizability vs. Robustness: Adversarial Examples for Medical Imaging.Magdalini Paschali; Sailesh Conjeti; Fernando Navarro; Nassir Navab CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography.Weixuan Tang; Bin Li; Shunquan Tan; Mauro Barni; Jiwu Huang Detecting Adversarial Perturbations with Saliency.Chiliang Zhang; Zhimou Yang; Zuochang Ye Improving DNN Robustness to Adversarial Attacks using Jacobian Regularization.Daniel Jakubovitz; Raja Giryes 2018-03-22 Understanding Measures of Uncertainty for Adversarial Example Detection.Lewis Smith; Yarin Gal 2018-03-21 Adversarial Defense based on Structure-to-Signal Autoencoders.Joachim Folz; Sebastian Palacio; Joern Hees; Damian Borth; Andreas Dengel Task dependent Deep LDA pruning of neural networks.Qing Tian; Tal Arbel; James J. Clark 2018-03-20 DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems.Lei Ma; Felix Juefei-Xu; Fuyuan Zhang; Jiyuan Sun; Minhui Xue; Bo Li; Chunyang Chen; Ting Su; Li Li; Yang Liu; Jianjun Zhao; Yadong Wang 2018-03-19 Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks.Octavian Suciu; Radu Mărginean; Yiğitcan Kaya; Hal III Daumé; Tudor Dumitraş Improving Transferability of Adversarial Examples with Input Diversity.Cihang Xie; Zhishuai Zhang; Yuyin Zhou; Song Bai; Jianyu Wang; Zhou Ren; Alan Yuille 2018-03-17 A Dual Approach to Scalable Verification of Deep Networks.Dj Krishnamurthy; Dvijotham; Robert Stanforth; Sven Gowal; Timothy Mann; Pushmeet Kohli 2018-03-16 Adversarial Logit Pairing.Harini Kannan; Alexey Kurakin; Ian Goodfellow Semantic Adversarial Examples.Hossein Hosseini; Radha Poovendran 2018-03-15 Large Margin Deep Networks for Classification.Gamaleldin F. Elsayed; Dilip Krishnan; Hossein Mobahi; Kevin Regan; Samy Bengio 2018-03-13 Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples.Zihao Liu; Qi Liu; Tao Liu; Nuo Xu; Xue Lin; Yanzhi Wang; Wujie Wen Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust Deep Learning.Nicolas Papernot; Patrick McDaniel Invisible Mask: Practical Attacks on Face Recognition with Infrared.Zhe Zhou; Di Tang; Xiaofeng Wang; Weili Han; Xiangyu Liu; Kehuan Zhang Defending against Adversarial Attack towards Deep Neural Networks via Collaborative Multi-task Training.Derek Wang; Chaoran Li; Sheng Wen; Surya Nepal; Yang Xiang 2018-03-12 Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables.Bojan Kolosnjaji; Ambra Demontis; Battista Biggio; Davide Maiorca; Giorgio Giacinto; Claudia Eckert; Fabio Roli 2018-03-10 Combating Adversarial Attacks Using Sparse Representations.Soorya Gopalakrishnan; Zhinus Marzi; Upamanyu Madhow; Ramtin Pedarsani Detecting Adversarial Examples via Neural Fingerprinting.Sumanth Dathathri; Stephan Zheng; Tianwei Yin; Richard M. Murray; Yisong Yue 2018-03-09 Detecting Adversarial Examples - A Lesson from Multimedia Forensics.Pascal Schöttle; Alexander Schlögl; Cecilia Pasquini; Rainer Böhme On Generation of Adversarial Examples using Convex Programming.Emilio Rafael Balda; Arash Behboodi; Rudolf Mathar Explaining Black-box Android Malware Detection.Marco Melis; Davide Maiorca; Battista Biggio; Giorgio Giacinto; Fabio Roli 2018-03-08 Rethinking Feature Distribution for Loss Functions in Image Classification.Weitao Wan; Yuanyi Zhong; Tianpeng Li; Jiansheng Chen 2018-03-07 Sparse Adversarial Perturbations for Videos.Xingxing Wei; Jun Zhu; Hang Su 2018-03-04 Stochastic Activation Pruning for Robust Adversarial Defense.Guneet S. Dhillon; Kamyar Azizzadenesheli; Zachary C. Lipton; Jeremy Bernstein; Jean Kossaifi; Aran Khanna; Anima Anandkumar 2018-03-03 Seq2Sick: Evaluating the Robustness of Sequence-to-Sequence Models with Adversarial Examples.Minhao Cheng; Jinfeng Yi; Pin-Yu Chen; Huan Zhang; Cho-Jui Hsieh 2018-03-02 Protecting JPEG Images Against Adversarial Attacks.Aaditya Prakash; Nick Moran; Solomon Garber; Antonella DiLillo; James Storer 2018-02-26 Understanding and Enhancing the Transferability of Adversarial Examples.Lei Wu; Zhanxing Zhu; Cheng Tai; Weinan E On the Suitability of $L_p$-norms for Creating and Preventing Adversarial Examples.Mahmood Sharif; Lujo Bauer; Michael K. Reiter Retrieval-Augmented Convolutional Neural Networks for Improved Robustness against Adversarial Examples.Jake Zhao; Kyunghyun Cho Max-Mahalanobis Linear Discriminant Analysis Networks.Tianyu Pang; Chao Du; Jun Zhu 2018-02-23 Deep Defense: Training DNNs with Improved Adversarial Robustness.Ziang Yan; Yiwen Guo; Changshui Zhang Sensitivity and Generalization in Neural Networks: an Empirical Study.Roman Novak; Yasaman Bahri; Daniel A. Abolafia; Jeffrey Pennington; Jascha Sohl-Dickstein Adversarial vulnerability for any classifier.Alhussein Fawzi; Hamza Fawzi; Omar Fawzi Verifying Controllers Against Adversarial Examples with Bayesian Optimization.Shromona Ghosh; Felix Berkenkamp; Gireeja Ranade; Shaz Qadeer; Ashish Kapoor 2018-02-22 Unravelling Robustness of Deep Learning based Face Recognition Against Adversarial Attacks.Gaurav Goswami; Nalini Ratha; Akshay Agarwal; Richa Singh; Mayank Vatsa Hessian-based Analysis of Large Batch Training and Robustness to Adversaries.Zhewei Yao; Amir Gholami; Qi Lei; Kurt Keutzer; Michael W. Mahoney Adversarial Examples that Fool both Computer Vision and Time-Limited Humans.Gamaleldin F. Elsayed; Shreya Shankar; Brian Cheung; Nicolas Papernot; Alex Kurakin; Ian Goodfellow; Jascha Sohl-Dickstein 2018-02-21 Adversarial Training for Probabilistic Spiking Neural Networks.Alireza Bagheri; Osvaldo Simeone; Bipin Rajendran L2-Nonexpansive Neural Networks.Haifeng Qian; Mark N. Wegman Generalizable Adversarial Examples Detection Based on Bi-model Decision Mismatch.João Monteiro; Isabela Albuquerque; Zahid Akhtar; Tiago H. Falk 2018-02-20 Attack Strength vs. Detectability Dilemma in Adversarial Machine Learning.Christopher Frederickson; Michael Moore; Glenn Dawson; Robi Polikar Out-distribution training confers robustness to deep neural networks.Mahdieh Abbasi; Christian Gagné 2018-02-19 On Lyapunov exponents and adversarial perturbation.Vinay Uday Prabhu; Nishant Desai; John Whaley Shield: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression.Nilaksh Das; Madhuri Shanbhogue; Shang-Tse Chen; Fred Hohman; Siwei Li; Li Chen; Michael E. Kounavis; Duen Horng Chau Divide, Denoise, and Defend against Adversarial Attacks.Seyed-Mohsen Moosavi-Dezfooli; Ashish Shrivastava; Oncel Tuzel Robustness of Rotation-Equivariant Networks to Adversarial Perturbations.Beranger Dumont; Simona Maggio; Pablo Montalvo Are Generative Classifiers More Robust to Adversarial Attacks?Yingzhen Li; John Bradshaw; Yash Sharma 2018-02-18 DARTS: Deceiving Autonomous Cars with Toxic Signs.Chawin Sitawarin; Arjun Nitin Bhagoji; Arsalan Mosenia; Mung Chiang; Prateek Mittal 2018-02-15 ASP:A Fast Adversarial Attack Example Generation Framework based on Adversarial Saliency Prediction.Fuxun Yu; Qide Dong; Xiang Chen Adversarial Risk and the Dangers of Evaluating Against Weak Attacks.Jonathan Uesato; Brendan O'Donoghue; Aaron van den Oord; Pushmeet Kohli 2018-02-14 Fooling OCR Systems with Adversarial Text Images.Congzheng Song; Vitaly Shmatikov Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks.Qi Liu; Tao Liu; Zihao Liu; Yanzhi Wang; Yier Jin; Wujie Wen 2018-02-13 Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints.Di Tang; XiaoFeng Wang; Kehuan Zhang Identify Susceptible Locations in Medical Records via Adversarial Attacks on Deep Predictive Models.Mengying Sun; Fengyi Tang; Jinfeng Yi; Fei Wang; Jiayu Zhou Deceiving End-to-End Deep Learning Malware Detectors using Adversarial Examples.Felix Kreuk; Assi Barak; Shir Aviv-Reuven; Moran Baruch; Benny Pinkas; Joseph Keshet 2018-02-12 Lipschitz-Margin Training: Scalable Certification of Perturbation Invariance for Deep Neural Networks.Yusuke Tsuzuku; Issei Sato; Masashi Sugiyama Predicting Adversarial Examples with High Confidence.Angus Galloway; Graham W. Taylor; Medhat Moussa 2018-02-09 Certified Robustness to Adversarial Examples with Differential Privacy.Mathias Lecuyer; Vaggelis Atlidakis; Roxana Geambasu; Daniel Hsu; Suman Jana 2018-02-08 Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection.Andrea Paudice; Luis Muñoz-González; Andras Gyorgy; Emil C. Lupu 2018-02-05 Blind Pre-Processing: A Robust Defense Method Against Adversarial Examples.Adnan Siraj Rakin; Zhezhi He; Boqing Gong; Deliang Fan First-order Adversarial Vulnerability of Neural Networks and Input Dimension.Carl-Johann Simon-Gabriel; Yann Ollivier; Léon Bottou; Bernhard Schölkopf; David Lopez-Paz 2018-02-02 Secure Detection of Image Manipulation by means of Random Feature Selection.Zhipeng Chen; Benedetta Tondi; Xiaolong Li; Rongrong Ni; Yao Zhao; Mauro Barni Hardening Deep Neural Networks via Adversarial Model Cascades.Deepak Vijaykeerthy; Anshuman Suri; Sameep Mehta; Ponnurangam Kumaraguru 2018-02-01 Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples.Anish Athalye; Nicholas Carlini; David Wagner 2018-01-31 Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach.Tsui-Wei Weng; Huan Zhang; Pin-Yu Chen; Jinfeng Yi; Dong Su; Yupeng Gao; Cho-Jui Hsieh; Luca Daniel 2018-01-29 Robustness of classification ability of spiking neural networks.Jie Yang; Pingping Zhang; Yan Liu 2018-01-28 Certified Defenses against Adversarial Examples.Aditi Raghunathan; Jacob Steinhardt; Percy Liang 2018-01-27 Towards an Understanding of Neural Networks in Natural-Image Spaces.Yifei Fan; Anthony Yezzi 2018-01-26 Deflecting Adversarial Attacks with Pixel Deflection.Aaditya Prakash; Nick Moran; Solomon Garber; Antonella DiLillo; James Storer Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning.Hyrum S. Anderson; Anant Kharkar; Bobby Filar; David Evans; Phil Roth 2018-01-24 CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.Xuejing Yuan; Yuxuan Chen; Yue Zhao; Yunhui Long; Xiaokang Liu; Kai Chen; Shengzhi Zhang; Heqing Huang; Xiaofeng Wang; Carl A. Gunter Generalizable Data-free Objective for Crafting Universal Adversarial Perturbations.Konda Reddy Mopuri; Aditya Ganeshan; R. Venkatesh Babu 2018-01-22 Adversarial Texts with Gradient Methods.Zhitao Gong; Wenlu Wang; Bo Li; Dawn Song; Wei-Shinn Ku 2018-01-15 A Comparative Study of Rule Extraction for Recurrent Neural Networks.Qinglong Wang; Kaixuan Zhang; Alexander G. II Ororbia; Xinyu Xing; Xue Liu; C. Lee Giles Sparsity-based Defense against Adversarial Attacks on Linear Classifiers.Zhinus Marzi; Soorya Gopalakrishnan; Upamanyu Madhow; Ramtin Pedarsani Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks.Bo Luo; Yannan Liu; Lingxiao Wei; Qiang Xu 2018-01-12 Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers.Ji Gao; Jack Lanchantin; Mary Lou Soffa; Yanjun Qi 2018-01-11 A3T: Adversarially Augmented Adversarial Training.Akram Erraqabi; Aristide Baratin; Yoshua Bengio; Simon Lacoste-Julien 2018-01-10 Fooling End-to-end Speaker Verification by Adversarial Examples.Felix Kreuk; Yossi Adi; Moustapha Cisse; Joseph Keshet 2018-01-09 Adversarial Deep Learning for Robust Detection of Binary Encoded Malware.Abdullah Al-Dujaili; Alex Huang; Erik Hemberg; Una-May O'Reilly Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks.Yongshuai Liu; Jiyu Chen; Hao Chen 2018-01-08 Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos.Chawin Sitawarin; Arjun Nitin Bhagoji; Arsalan Mosenia; Prateek Mittal; Mung Chiang Adversarial Spheres.Justin Gilmer; Luke Metz; Fartash Faghri; Samuel S. Schoenholz; Maithra Raghu; Martin Wattenberg; Ian Goodfellow Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality.Xingjun Ma; Bo Li; Yisen Wang; Sarah M. Erfani; Sudanthi Wijewickrema; Grant Schoenebeck; Dawn Song; Michael E. Houle; James Bailey Spatially Transformed Adversarial Examples.Chaowei Xiao; Jun-Yan Zhu; Bo Li; Warren He; Mingyan Liu; Dawn Song Generating Adversarial Examples with Adversarial Networks.Chaowei Xiao; Bo Li; Jun-Yan Zhu; Warren He; Mingyan Liu; Dawn Song LaVAN: Localized and Visible Adversarial Noise.Danny Karmon; Daniel Zoran; Yoav Goldberg Attacking Speaker Recognition With Deep Generative Models.Wilson Cai; Anish Doshi; Rafael Valle HeNet: A Deep Learning Approach on Intel$^\circledR$ Processor Trace for Effective Exploit Detection.Li Chen; Salmin Sultana; Ravi Sahita 2018-01-07 Denoising Dictionary Learning Against Adversarial Perturbations.John Mitro; Derek Bridge; Steven Prestwich 2018-01-05 Adversarial Perturbation Intensity Achieving Chosen Intra-Technique Transferability Level for Logistic Regression.Martin Gubri Audio Adversarial Examples: Targeted Attacks on Speech-to-Text.Nicholas Carlini; David Wagner Shielding Google's language toxicity model against adversarial attacks.Nestor Rodriguez; Sergio Rojas-Galeano 2018-01-03 Facial Attributes: Accuracy and Adversarial Robustness.Andras Rozsa; Manuel Günther; Ethan M. Rudd; Terrance E. Boult Neural Networks in Adversarial Setting and Ill-Conditioned Weight Space.Mayank Singh; Abhishek Sinha; Balaji Krishnamurthy 2018-01-02 High Dimensional Spaces, Deep Learning and Adversarial Examples.Simant Dube Did you hear that? Adversarial Examples Against Automatic Speech Recognition.Moustafa Alzantot; Bharathan Balaji; Mani Srivastava Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey.Naveed Akhtar; Ajmal Mian 2017-12-31 A General Framework for Adversarial Examples with Objectives.Mahmood Sharif; Sruti Bhagavatula; Lujo Bauer; Michael K. Reiter 2017-12-28 Gradient Regularization Improves Accuracy of Discriminative Models.Dániel Varga; Adrián Csiszárik; Zsolt Zombori 2017-12-27 Adversarial Patch.Tom B. Brown; Dandelion Mané; Aurko Roy; Martín Abadi; Justin Gilmer 2017-12-26 Exploring the Space of Black-box Attacks on Deep Neural Networks.Arjun Nitin Bhagoji; Warren He; Bo Li; Dawn Song Building Robust Deep Neural Networks for Road Sign Detection.Arkar Min Aung; Yousef Fadila; Radian Gondokaryono; Luis Gonzalez The Robust Manifold Defense: Adversarial Training using Generative Models.Ajil Jalal; Andrew Ilyas; Constantinos Daskalakis; Alexandros G. Dimakis 2017-12-24 Android Malware Detection using Deep Learning on API Method Sequences.ElMouatez Billah Karbab; Mourad Debbabi; Abdelouahid Derhab; Djedjiga Mouheb 2017-12-23 Whatever Does Not Kill Deep Reinforcement Learning, Makes It Stronger.Vahid Behzadan; Arslan Munir 2017-12-22 Query-limited Black-box Attacks to Classifiers.Fnu Suya; Yuan Tian; David Evans; Paolo Papotti 2017-12-21 Using LIP to Gloss Over Faces in Single-Stage Face Detection Networks.Siqi Yang; Arnold Wiliem; Shaokang Chen; Brian C. Lovell ReabsNet: Detecting and Revising Adversarial Examples.Jiefeng Chen; Zihang Meng; Changtian Sun; Wei Tang; Yinglun Zhu Note on Attacking Object Detectors with Adversarial Stickers.Kevin Eykholt; Ivan Evtimov; Earlence Fernandes; Bo Li; Dawn Song; Tadayoshi Kohno; Amir Rahmati; Atul Prakash; Florian Tramer Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications.Qixue Xiao; Kang Li; Deyue Zhang; Yier Jin 2017-12-19 Query-Efficient Black-box Adversarial Examples (superceded).Andrew Ilyas; Logan Engstrom; Anish Athalye; Jessy Lin Adversarial Examples: Attacks and Defenses for Deep Learning.Xiaoyong Yuan; Pan He; Qile Zhu; Xiaolin Li 2017-12-18 HotFlip: White-Box Adversarial Examples for Text Classification.Javid Ebrahimi; Anyi Rao; Daniel Lowd; Dejing Dou When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time.David J. Miller; Yulia Wang; George Kesidis 2017-12-17 Deep Neural Networks as 0-1 Mixed Integer Linear Programs: A Feasibility Study.Matteo Fischetti; Jason Jo Super-sparse Learning in Similarity Spaces.Ambra Demontis; Marco Melis; Battista Biggio; Giorgio Fumera; Fabio Roli 2017-12-16 Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Classification Models.Jack W. Stokes; De Wang; Mady Marinescu; Marc Marino; Brian Bussone 2017-12-14 DANCin SEQ2SEQ: Fooling Text Classifiers with Adversarial Text Example Generation.Catherine Wong 2017-12-12 Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models.Wieland Brendel; Jonas Rauber; Matthias Bethge 2017-12-11 Training Ensembles to Detect Adversarial Examples.Alexander Bagnall; Razvan Bunescu; Gordon Stewart 2017-12-10 Robust Deep Reinforcement Learning with Adversarial Attacks.Anay Pattanaik; Zhenyi Tang; Shuijing Liu; Gautham Bommannan; Girish Chowdhary 2017-12-09 NAG: Network for Adversary Generation.Konda Reddy Mopuri; Utkarsh Ojha; Utsav Garg; R. Venkatesh Babu 2017-12-08 Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning.Battista Biggio; Fabio Roli Defense against Adversarial Attacks Using High-Level Representation Guided Denoiser.Fangzhou Liao; Ming Liang; Yinpeng Dong; Tianyu Pang; Xiaolin Hu; Jun Zhu 2017-12-07 Adversarial Examples that Fool Detectors.Jiajun Lu; Hussein Sibai; Evan Fabry Exploring the Landscape of Spatial Robustness.Logan Engstrom; Brandon Tran; Dimitris Tsipras; Ludwig Schmidt; Aleksander Madry 2017-12-06 Generative Adversarial Perturbations.Omid Poursaeed; Isay Katsman; Bicheng Gao; Serge Belongie Attacking Visual Language Grounding with Adversarial Examples: A Case Study on Neural Image Captioning.Hongge Chen; Huan Zhang; Pin-Yu Chen; Jinfeng Yi; Cho-Jui Hsieh 2017-12-05 Towards Practical Verification of Machine Learning: The Case of Computer Vision Systems.Kexin Pei; Yinzhi Cao; Junfeng Yang; Suman Jana 2017-12-02 Improving Network Robustness against Adversarial Attacks with Compact Convolution.Rajeev Ranjan; Swami Sankaranarayanan; Carlos D. Castillo; Rama Chellappa Towards Robust Neural Networks via Random Self-ensemble.Xuanqing Liu; Minhao Cheng; Huan Zhang; Cho-Jui Hsieh Where Classification Fails, Interpretation Rises.Chanh Nguyen; Georgi Georgiev; Yujie Ji; Ting Wang 2017-11-30 Measuring the tendency of CNNs to Learn Surface Statistical Regularities.Jason Jo; Yoshua Bengio 2017-11-27 Adversary Detection in Neural Networks via Persistent Homology.Thomas Gebhart; Paul Schrater On the Robustness of Semantic Segmentation Models to Adversarial Attacks.Anurag Arnab; Ondrej Miksik; Philip H. S. Torr Butterfly Effect: Bidirectional Control of Classification Performance by Small Additive Perturbation.YoungJoon Yoo; Seonguk Park; Junyoung Choi; Sangdoo Yun; Nojun Kwak 2017-11-26 Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing their Input Gradients.Andrew Slavin Ross; Finale Doshi-Velez 2017-11-24 Geometric robustness of deep networks: analysis and improvement.Can Kanbak; Seyed-Mohsen Moosavi-Dezfooli; Pascal Frossard 2017-11-22 Safer Classification by Synthesis.William Wang; Angelina Wang; Aviv Tamar; Xi Chen; Pieter Abbeel MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples.Nicholas Carlini; David Wagner Adversarial Phenomenon in the Eyes of Bayesian Deep Learning.Ambrish Rawat; Martin Wistuba; Maria-Irina Nicolae 2017-11-21 Reinforcing Adversarial Robustness using Model Confidence Induced by Adversarial Training.Xi Wu; Uyeong Jang; Jiefeng Chen; Lingjiao Chen; Somesh Jha 2017-11-20 Evaluating Robustness of Neural Networks with Mixed Integer Programming.Vincent Tjeng; Kai Xiao; Russ Tedrake Adversarial Attacks Beyond the Image Space.Xiaohui Zeng; Chenxi Liu; Yu-Siang Wang; Weichao Qiu; Lingxi Xie; Yu-Wing Tai; Chi Keung Tang; Alan L. Yuille 2017-11-17 How Wrong Am I? - Studying Adversarial Examples and their Impact on Uncertainty in Gaussian Process Machine Learning Models.Kathrin Grosse; David Pfaff; Michael Thomas Smith; Michael Backes 2017-11-16 Enhanced Attacks on Defensively Distilled Deep Neural Networks.Yujia Liu; Weiming Zhang; Shaohua Li; Nenghai Yu Defense against Universal Adversarial Perturbations.Naveed Akhtar; Jian Liu; Ajmal Mian 2017-11-15 The best defense is a good offense: Countering black box attacks by predicting slightly wrong labels.Yannic Kilcher; Thomas Hofmann 2017-11-12 Machine vs Machine: Minimax-Optimal Defense Against Adversarial Examples.Jihun Hamm; Akshay Mehra 2017-11-09 Crafting Adversarial Examples For Speech Paralinguistics Applications.Yuan Gong; Christian Poellabauer 2017-11-08 Intriguing Properties of Adversarial Examples.Ekin D. Cubuk; Barret Zoph; Samuel S. Schoenholz; Quoc V. Le 2017-11-06 Mitigating Adversarial Effects Through Randomization.Cihang Xie; Jianyu Wang; Zhishuai Zhang; Zhou Ren; Alan Yuille HyperNetworks with statistical filtering for defending adversarial examples.Zhun Sun; Mete Ozay; Takayuki Okatani Towards Reverse-Engineering Black-Box Neural Networks.Seong Joon Oh; Max Augustin; Bernt Schiele; Mario Fritz 2017-11-02 The (Un)reliability of saliency methods.Pieter-Jan Kindermans; Sara Hooker; Julius Adebayo; Maximilian Alber; Kristof T. Schütt; Sven Dähne; Dumitru Erhan; Been Kim Provable defenses against adversarial examples via the convex outer adversarial polytope.Eric Wong; J. Zico Kolter 2017-11-01 Attacking Binarized Neural Networks.Angus Galloway; Graham W. Taylor; Medhat Moussa 2017-10-31 Countering Adversarial Images using Input Transformations.Chuan Guo; Mayank Rana; Moustapha Cisse; der Maaten Laurens van Conditional Variance Penalties and Domain Shift Robustness.Christina Heinze-Deml; Nicolai Meinshausen Generating Natural Adversarial Examples.Zhengli Zhao; Dheeru Dua; Sameer Singh 2017-10-30 PixelDefend: Leveraging Generative Models to Understand and Defend against Adversarial Examples.Yang Song; Taesup Kim; Sebastian Nowozin; Stefano Ermon; Nate Kushman 2017-10-29 Attacking the Madry Defense Model with $L_1$-based Adversarial Examples.Yash Sharma; Pin-Yu Chen Certifying Some Distributional Robustness with Principled Adversarial Training.Aman Sinha; Hongseok Namkoong; Riccardo Volpi; John Duchi 2017-10-28 Interpretation of Neural Networks is Fragile.Amirata Ghorbani; Abubakar Abid; James Zou 2017-10-27 Adversarial Detection of Flash Malware: Limitations and Open Issues.Davide Maiorca; Ambra Demontis; Battista Biggio; Fabio Roli; Giorgio Giacinto 2017-10-25 mixup: Beyond Empirical Risk Minimization.Hongyi Zhang; Moustapha Cisse; Yann N. Dauphin; David Lopez-Paz 2017-10-24 One pixel attack for fooling deep neural networks.Jiawei Su; Danilo Vasconcellos Vargas; Sakurai Kouichi 2017-10-21 Feature-Guided Black-Box Safety Testing of Deep Neural Networks.Matthew Wicker; Xiaowei Huang; Marta Kwiatkowska 2017-10-17 Boosting Adversarial Attacks with Momentum.Yinpeng Dong; Fangzhou Liao; Tianyu Pang; Hang Su; Jun Zhu; Xiaolin Hu; Jianguo Li 2017-10-12 Game-Theoretic Design of Secure and Resilient Distributed Support Vector Machines with Adversaries.Rui Zhang; Quanyan Zhu 2017-10-09 Standard detectors aren't (currently) fooled by physical adversarial stop signs.Jiajun Lu; Hussein Sibai; Evan Fabry; David Forsyth Verification of Binarized Neural Networks via Inter-Neuron Factoring.Chih-Hong Cheng; Georg Nührenberg; Chung-Hao Huang; Harald Ruess 2017-10-02 Detecting Adversarial Attacks on Neural Network Policies with Visual Foresight.Yen-Chen Lin; Ming-Yu Liu; Min Sun; Jia-Bin Huang DeepSafe: A Data-driven Approach for Checking Adversarial Robustness in Neural Networks.Divya Gopinath; Guy Katz; Corina S. Pasareanu; Clark Barrett 2017-09-28 Provably Minimally-Distorted Adversarial Examples.Nicholas Carlini; Guy Katz; Clark Barrett; David L. Dill DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.Ferdinand Technische Universität Darmstadt, Germany Brasser; Srdjan ETH Zurich, Switzerland Capkun; Alexandra University of Würzburg Dmitrienko; Tommaso Technische Universität Darmstadt, Germany Frassetto; Kari ETH Zurich, Switzerland Kostiainen; Ahmad-Reza Technische Universität Darmstadt, Germany Sadeghi 2017-09-26 Output Range Analysis for Deep Neural Networks.Souradeep Dutta; Susmit Jha; Sriram Sanakaranarayanan; Ashish Tiwari 2017-09-25 Fooling Vision and Language Models Despite Localization and Attention Mechanism.Xiaojun Xu; Xinyun Chen; Chang Liu; Anna Rohrbach; Trevor Darrell; Dawn Song 2017-09-19 Verifying Properties of Binarized Deep Neural Networks.Nina Narodytska; Shiva Prasad Kasiviswanathan; Leonid Ryzhyk; Mooly Sagiv; Toby Walsh 2017-09-16 Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification.Xiaoyu Cao; Neil Zhenqiang Gong 2017-09-13 A Learning and Masking Approach to Secure Learning.Linh Nguyen; Sky Wang; Arunesh Sinha Models and Framework for Adversarial Attacks on Complex Adaptive Systems.Vahid Behzadan; Arslan Munir 2017-09-12 EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples.Pin-Yu Chen; Yash Sharma; Huan Zhang; Jinfeng Yi; Cho-Jui Hsieh 2017-09-11 Art of singular vectors and universal adversarial perturbations.Valentin Khrulkov; Ivan Oseledets Ensemble Methods as a Defense to Adversarial Perturbations Against Deep Neural Networks.Thilo Strauss; Markus Hanselmann; Andrej Junginger; Holger Ulmer 2017-09-08 Towards Proving the Adversarial Robustness of Deep Neural Networks.Guy Stanford University Katz; Clark Stanford University Barrett; David L. Stanford University Dill; Kyle Stanford University Julian; Mykel J. Stanford University Kochenderfer DeepFense: Online Accelerated Defense Against Adversarial Deep Learning.Bita Darvish Rouhani; Mohammad Samragh; Mojan Javaheripi; Tara Javidi; Farinaz Koushanfar 2017-09-02 Security Evaluation of Pattern Classifiers under Attack.Battista Biggio; Giorgio Fumera; Fabio Roli 2017-08-31 On Security and Sparsity of Linear Classifiers for Adversarial Settings.Ambra Demontis; Paolo Russu; Battista Biggio; Giorgio Fumera; Fabio Roli Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin.Yujin Kwon; Dohyun Kim; Yunmok Son; Eugene Vasserman; Yongdae Kim 2017-08-29 Practical Attacks Against Graph-based Clustering.Yizheng Chen; Yacin Nadji; Athanasios Kountouras; Fabian Monrose; Roberto Perdisci; Manos Antonakakis; Nikolaos Vasiloglou 2017-08-28 DeepTest: Automated Testing of Deep-Neural-Network-driven Autonomous Cars.Yuchi Tian; Kexin Pei; Suman Jana; Baishakhi Ray Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features.Liang Tong; Bo Li; Chen Hajaj; Chaowei Xiao; Ning Zhang; Yevgeniy Vorobeychik 2017-08-23 Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid.Marco Melis; Ambra Demontis; Battista Biggio; Gavin Brown; Giorgio Fumera; Fabio Roli 2017-08-22 CNN Fixations: An unraveling approach to visualize the discriminative image regions.Konda Reddy Mopuri; Utsav Garg; R. Venkatesh Babu 2017-08-21 Evasion Attacks against Machine Learning at Test Time.Battista Biggio; Igino Corona; Davide Maiorca; Blaine Nelson; Nedim Srndic; Pavel Laskov; Giorgio Giacinto; Fabio Roli 2017-08-17 Towards Interpretable Deep Neural Networks by Leveraging Adversarial Examples.Yinpeng Dong; Hang Su; Jun Zhu; Fan Bao Learning Universal Adversarial Perturbations with Generative Models.Jamie Hayes; George Danezis 2017-08-14 Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API.Hossein Hosseini; Baicen Xiao; Andrew Clark; Radha Poovendran 2017-08-13 ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models.Pin-Yu Chen; Huan Zhang; Yash Sharma; Jinfeng Yi; Cho-Jui Hsieh 2017-08-08 Cascade Adversarial Machine Learning Regularized with a Unified Embedding.Taesik Na; Jong Hwan Ko; Saibal Mukhopadhyay 2017-08-04 Adversarial Robustness: Softmax versus Openmax.Andras Rozsa; Manuel Günther; Terrance E. Boult 2017-08-01 Adversarial-Playground: A Visualization Suite Showing How Adversarial Examples Fool Deep Learning.Andrew P. Norton; Yanjun Qi 2017-07-27 Robust Physical-World Attacks on Deep Learning Models.Kevin Eykholt; Ivan Evtimov; Earlence Fernandes; Bo Li; Amir Rahmati; Chaowei Xiao; Atul Prakash; Tadayoshi Kohno; Dawn Song 2017-07-24 Synthesizing Robust Adversarial Examples.Anish Athalye; Logan Engstrom; Andrew Ilyas; Kevin Kwok 2017-07-23 Adversarial Examples for Evaluating Reading Comprehension Systems.Robin Jia; Percy Liang 2017-07-21 Confidence estimation in Deep Neural networks via density modelling.Akshayvarun Subramanya; Suraj Srinivas; R. Venkatesh Babu 2017-07-20 Efficient Defenses Against Adversarial Attacks.Valentina Zantedeschi; Maria-Irina Nicolae; Ambrish Rawat 2017-07-19 Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.Ishai Rosenberg; Asaf Shabtai; Lior Rokach; Yuval Elovici 2017-07-18 Fast Feature Fool: A data independent approach to universal adversarial perturbations.Konda Reddy Mopuri; Utsav Garg; R. Venkatesh Babu APE-GAN: Adversarial Perturbation Elimination with GAN.Shiwei Shen; Guoqing Jin; Ke Gao; Yongdong Zhang 2017-07-17 Houdini: Fooling Deep Structured Prediction Models.Moustapha Cisse; Yossi Adi; Natalia Neverova; Joseph Keshet 2017-07-13 Foolbox: A Python toolbox to benchmark the robustness of machine learning models.Jonas Rauber; Wieland Brendel; Matthias Bethge 2017-07-11 NO Need to Worry about Adversarial Examples in Object Detection in Autonomous Vehicles.Jiajun Lu; Hussein Sibai; Evan Fabry; David Forsyth A Survey on Resilient Machine Learning.Atul Kumar; Sameep Mehta 2017-07-10 Towards Crafting Text Adversarial Samples.Suranjana Samanta; Sameep Mehta 2017-07-04 UPSET and ANGRI : Breaking High Performance Image Classifiers.Sayantan Sarkar; Ankan Bansal; Upal Mahbub; Rama Chellappa 2017-06-21 Comparing deep neural networks against humans: object recognition when the signal gets weaker.Robert Geirhos; David H. J. Janssen; Heiko H. Schütt; Jonas Rauber; Matthias Bethge; Felix A. Wichmann 2017-06-19 Towards Deep Learning Models Resistant to Adversarial Attacks.Aleksander Madry; Aleksandar Makelov; Ludwig Schmidt; Dimitris Tsipras; Adrian Vladu 2017-06-14 Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong.Warren He; James Wei; Xinyun Chen; Nicholas Carlini; Dawn Song 2017-06-13 Analyzing the Robustness of Nearest Neighbors to Adversarial Examples.Yizhen Wang; Somesh Jha; Kamalika Chaudhuri 2017-06-06 Adversarial-Playground: A Visualization Suite for Adversarial Sample Generation.Andrew Norton; Yanjun Qi 2017-06-02 Towards Robust Detection of Adversarial Examples.Tianyu Pang; Chao Du; Yinpeng Dong; Jun Zhu 2017-05-30 Feature Squeezing Mitigates and Detects Carlini/Wagner Adversarial Examples.Weilin Xu; David Evans; Yanjun Qi 2017-05-27 MAT: A Multi-strength Adversarial Training Method to Mitigate Adversarial Attacks.Chang Song; Hsin-Pai Cheng; Huanrui Yang; Sicheng Li; Chunpeng Wu; Qing Wu; Hai Li; Yiran Chen 2017-05-26 Classification regions of deep neural networks.Alhussein Fawzi; Seyed-Mohsen Moosavi-Dezfooli; Pascal Frossard; Stefano Soatto Robustness of classifiers to universal perturbations: a geometric perspective.Seyed-Mohsen Moosavi-Dezfooli; Alhussein Fawzi; Omar Fawzi; Pascal Frossard; Stefano Soatto 2017-05-25 MagNet: a Two-Pronged Defense against Adversarial Examples.Dongyu Meng; Hao Chen 2017-05-23 Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation.Matthias Hein; Maksym Andriushchenko Detecting Adversarial Image Examples in Deep Networks with Adaptive Noise Reduction.Bin Liang; Hongcheng Li; Miaoqiang Su; Xirong Li; Wenchang Shi; Xiaofeng Wang Black-Box Attacks against RNN based Malware Detection Algorithms.Weiwei Hu; Ying Tan 2017-05-22 Regularizing deep networks using efficient layerwise adversarial training.Swami Sankaranarayanan; Arpit Jain; Rama Chellappa; Ser Nam Lim 2017-05-21 Evading Classifiers by Morphing in the Dark.Hung Dang; Yue Huang; Ee-Chien Chang 2017-05-20 Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods.Nicholas Carlini; David Wagner 2017-05-19 Ensemble Adversarial Training: Attacks and Defenses.Florian Tramèr; Alexey Kurakin; Nicolas Papernot; Ian Goodfellow; Dan Boneh; Patrick McDaniel MTDeep: Boosting the Security of Deep Neural Nets Against Adversarial Attacks with Moving Target Defense.Sailik Sengupta; Tathagata Chakraborti; Subbarao Kambhampati 2017-05-18 DeepXplore: Automated Whitebox Testing of Deep Learning Systems.Kexin Pei; Yinzhi Cao; Junfeng Yang; Suman Jana Delving into adversarial attacks on deep policies.Jernej Kos; Dawn Song 2017-05-15 Extending Defensive Distillation.Nicolas Papernot; Patrick McDaniel 2017-05-09 Generative Adversarial Trainer: Defense to Adversarial Perturbations with GAN.Hyeungill Lee; Sungyeob Han; Jungwoo Lee 2017-05-08 Keeping the Bad Guys Out: Protecting and Vaccinating Deep Learning with JPEG Compression.Nilaksh Das; Madhuri Shanbhogue; Shang-Tse Chen; Fred Hohman; Li Chen; Michael E. Kounavis; Duen Horng Chau 2017-05-05 Detecting Adversarial Samples Using Density Ratio Estimates.Lovedeep Gondara 2017-04-28 Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection.Ambra Demontis; Marco Melis; Battista Biggio; Davide Maiorca; Daniel Arp; Konrad Rieck; Igino Corona; Giorgio Giacinto; Fabio Roli Parseval Networks: Improving Robustness to Adversarial Examples.Moustapha Cisse; Piotr Bojanowski; Edouard Grave; Yann Dauphin; Nicolas Usunier 2017-04-26 Deep Text Classification Can be Fooled.Bin Liang; Hongcheng Li; Miaoqiang Su; Pan Bian; Xirong Li; Wenchang Shi 2017-04-19 Universal Adversarial Perturbations Against Semantic Image Segmentation.Jan Hendrik Metzen; Mummadi Chaithanya Kumar; Thomas Brox; Volker Fischer 2017-04-17 Adversarial and Clean Data Are Not Twins.Zhitao Gong; Wenlu Wang; Wei-Shinn Ku 2017-04-16 Google's Cloud Vision API Is Not Robust To Noise.Hossein Hosseini; Baicen Xiao; Radha Poovendran 2017-04-11 The Space of Transferable Adversarial Examples.Florian Tramèr; Nicolas Papernot; Ian Goodfellow; Dan Boneh; Patrick McDaniel 2017-04-09 Enhancing Robustness of Machine Learning Systems via Data Transformations.Arjun Nitin Bhagoji; Daniel Cullina; Chawin Sitawarin; Prateek Mittal 2017-04-06 Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks.Yi Han; Benjamin I. P. Rubinstein 2017-04-05 Comment on "Biologically inspired protection of deep networks from adversarial attacks".Wieland Brendel; Matthias Bethge 2017-04-04 Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks.Weilin Xu; David Evans; Yanjun Qi 2017-03-31 SafetyNet: Detecting and Rejecting Adversarial Examples Robustly.Jiajun Lu; Theerasit Issaranon; David Forsyth 2017-03-27 Adversarial Transformation Networks: Learning to Generate Adversarial Examples.Shumeet Baluja; Ian Fischer Biologically inspired protection of deep networks from adversarial attacks.Aran Nayebi; Surya Ganguli 2017-03-26 Deceiving Google's Cloud Video Intelligence API Built for Summarizing Videos.Hossein Hosseini; Baicen Xiao; Radha Poovendran 2017-03-24 Adversarial Examples for Semantic Segmentation and Object Detection.Cihang Xie; Jianyu Wang; Zhishuai Zhang; Yuyin Zhou; Lingxi Xie; Alan Yuille 2017-03-23 Self corrective Perturbations for Semantic Segmentation and Classification.Swami Sankaranarayanan; Arpit Jain; Ser Nam Lim 2017-03-22 Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains.Tegjyot Singh Sethi; Mehmed Kantardzic 2017-03-20 On the Limitation of Convolutional Neural Networks in Recognizing Negative Images.Hossein Hosseini; Baicen Xiao; Mayoore Jaiswal; Radha Poovendran 2017-03-16 Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking.Erwin Quiring; Daniel Arp; Konrad Rieck 2017-03-13 Blocking Transferability of Adversarial Examples in Black-Box Learning Systems.Hossein Hosseini; Yize Chen; Sreeram Kannan; Baosen Zhang; Radha Poovendran 2017-03-07 Tactics of Adversarial Attack on Deep Reinforcement Learning Agents.Yen-Chen Lin; Zhang-Wei Hong; Yuan-Hong Liao; Meng-Li Shih; Ming-Yu Liu; Min Sun 2017-03-03 Adversarial Examples for Semantic Image Segmentation.Volker Fischer; Mummadi Chaithanya Kumar; Jan Hendrik Metzen; Thomas Brox 2017-03-02 Compositional Falsification of Cyber-Physical Systems with Machine Learning Components.Tommaso Dreossi; Alexandre Donzé; Sanjit A. Seshia 2017-03-01 Detecting Adversarial Samples from Artifacts.Reuben Feinman; Ryan R. Curtin; Saurabh Shintre; Andrew B. Gardner 2017-02-26 Deceiving Google's Perspective API Built for Detecting Toxic Comments.Hossein Hosseini; Sreeram Kannan; Baosen Zhang; Radha Poovendran 2017-02-22 Robustness to Adversarial Examples through an Ensemble of Specialists.Mahdieh Abbasi; Christian Gagné Adversarial examples for generative models.Jernej Kos; Ian Fischer; Dawn Song DeepCloak: Masking Deep Neural Network Models for Robustness Against Adversarial Samples.Ji Gao; Beilun Wang; Zeming Lin; Weilin Xu; Yanjun Qi 2017-02-21 On the (Statistical) Detection of Adversarial Examples.Kathrin Grosse; Praveen Manoharan; Nicolas Papernot; Michael Backes; Patrick McDaniel 2017-02-20 Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN.Weiwei Hu; Ying Tan 2017-02-14 On Detecting Adversarial Perturbations.Jan Hendrik Metzen; Tim Genewein; Volker Fischer; Bastian Bischoff 2017-02-07 Adversarial Attacks on Neural Network Policies.Sandy Huang; Nicolas Papernot; Ian Goodfellow; Yan Duan; Pieter Abbeel 2017-02-03 Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks.Guy Katz; Clark Barrett; David Dill; Kyle Julian; Mykel Kochenderfer 2017-01-15 Vulnerability of Deep Reinforcement Learning to Policy Induction Attacks.Vahid Behzadan; Arslan Munir 2017-01-04 Dense Associative Memory is Robust to Adversarial Inputs.Dmitry Krotov; John J Hopfield 2016-12-22 Adversarial Examples Detection in Deep Networks with Convolutional Filter Statistics.Xin Li; Fuxin Li 2016-12-19 Simple Black-Box Adversarial Perturbations for Deep Networks.Nina Narodytska; Shiva Prasad Kasiviswanathan 2016-12-05 Learning Adversary-Resistant Deep Neural Networks.Qinglong Wang; Wenbo Guo; Kaixuan Zhang; Alexander G. II Ororbia; Xinyu Xing; Xue Liu; C. Lee Giles 2016-12-01 A Theoretical Framework for Robustness of (Deep) Classifiers against Adversarial Examples.Beilun Wang; Ji Gao; Yanjun Qi Adversarial Images for Variational Autoencoders.Pedro Tabacof; Julia Tavares; Eduardo Valle Deep Variational Information Bottleneck.Alexander A. Alemi; Ian Fischer; Joshua V. Dillon; Kevin Murphy 2016-11-30 Towards Robust Deep Neural Networks with BANG.Andras Rozsa; Manuel Gunther; Terrance E. Boult 2016-11-18 LOTS about Attacking Deep Features.Andras Rozsa; Manuel Günther; Terrance E. Boult 2016-11-15 AdversariaLib: An Open-source Library for the Security Evaluation of Machine Learning Algorithms Under Attack.Igino Corona; Battista Biggio; Davide Maiorca 2016-11-11 Towards the Science of Security and Privacy in Machine Learning.Nicolas Papernot; Patrick McDaniel; Arunesh Sinha; Michael Wellman 2016-11-08 Delving into Transferable Adversarial Examples and Black-box Attacks.Yanpei Liu; Xinyun Chen; Chang Liu; Dawn Song 2016-11-03 Adversarial Machine Learning at Scale.Alexey Kurakin; Ian Goodfellow; Samy Bengio 2016-10-26 Universal adversarial perturbations.Seyed-Mohsen Moosavi-Dezfooli; Alhussein Fawzi; Omar Fawzi; Pascal Frossard 2016-10-21 Safety Verification of Deep Neural Networks.Xiaowei Huang; Marta Kwiatkowska; Sen Wang; Min Wu 2016-10-14 Are Accuracy and Robustness Correlated?Andras Rozsa; Manuel Günther; Terrance E. Boult 2016-10-13 Assessing Threat of Adversarial Examples on Deep Neural Networks.Abigail Graese; Andras Rozsa; Terrance E. Boult 2016-10-06 Using Non-invertible Data Transformations to Build Adversarial-Robust Neural Networks.Qinglong Wang; Wenbo Guo; Alexander G. II Ororbia; Xinyu Xing; Lin Lin; C. Lee Giles; Xue Liu; Peng Liu; Gang Xiong 2016-10-04 Adversary Resistant Deep Neural Networks with an Application to Malware Detection.Qinglong Wang; Wenbo Guo; Kaixuan Zhang; Alexander G. II Ororbia; Xinyu Xing; C. Lee Giles; Xue Liu 2016-10-03 Technical Report on the CleverHans v2.1.0 Adversarial Examples Library.Nicolas Papernot; Fartash Faghri; Nicholas Carlini; Ian Goodfellow; Reuben Feinman; Alexey Kurakin; Cihang Xie; Yash Sharma; Tom Brown; Aurko Roy; Alexander Matyasko; Vahid Behzadan; Karen Hambardzumyan; Zhishuai Zhang; Yi-Lin Juang; Zhi Li; Ryan Sheatsley; Abhibhav Garg; Jonathan Uesato; Willi Gierke; Yinpeng Dong; David Berthelot; Paul Hendricks; Jonas Rauber; Rujun Long; Patrick McDaniel 2016-09-06 Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems.Battista Biggio; Giorgio Fumera; Gian Luca Marcialis; Fabio Roli 2016-09-03 Randomized Prediction Games for Adversarial Machine Learning.Samuel Rota Bulò; Battista Biggio; Ignazio Pillai; Marcello Pelillo; Fabio Roli 2016-08-31 Robustness of classifiers: from adversarial to random noise.Alhussein Fawzi; Seyed-Mohsen Moosavi-Dezfooli; Pascal Frossard 2016-08-27 A Boundary Tilting Persepective on the Phenomenon of Adversarial Examples.Thomas Tanay; Lewis Griffin 2016-08-16 Towards Evaluating the Robustness of Neural Networks.Nicholas Carlini; David Wagner 2016-08-02 A study of the effect of JPG compression on adversarial images.Gintare Karolina Dziugaite; Zoubin Ghahramani; Daniel M. Roy 2016-08-01 Early Methods for Detecting Adversarial Images.Dan Hendrycks; Kevin Gimpel 2016-07-18 On the Effectiveness of Defensive Distillation.Nicolas Papernot; Patrick McDaniel 2016-07-14 Defensive Distillation is Not Robust to Adversarial Examples.Nicholas Carlini; David Wagner 2016-07-08 Adversarial examples in the physical world.Alexey Kurakin; Ian Goodfellow; Samy Bengio 2016-06-14 Adversarial Perturbations Against Deep Neural Networks for Malware Classification.Kathrin Grosse; Nicolas Papernot; Praveen Manoharan; Michael Backes; Patrick McDaniel 2016-05-23 Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples.Nicolas Papernot; Patrick McDaniel; Ian Goodfellow Measuring Neural Net Robustness with Constraints.Osbert Bastani; Yani Ioannou; Leonidas Lampropoulos; Dimitrios Vytiniotis; Aditya Nori; Antonio Criminisi 2016-05-17 Are Facial Attributes Adversarially Robust?Andras Rozsa; Manuel Günther; Ethan M. Rudd; Terrance E. Boult 2016-05-05 Adversarial Diversity and Hard Positive Generation.Andras Rozsa; Ethan M. Rudd; Terrance E. Boult 2016-04-27 Crafting Adversarial Input Sequences for Recurrent Neural Networks.Nicolas Papernot; Patrick McDaniel; Ananthram Swami; Richard Harang 2016-04-14 Improving the Robustness of Deep Neural Networks via Stability Training.Stephan Zheng; Yang Song; Thomas Leung; Ian Goodfellow 2016-04-09 A General Retraining Framework for Scalable Adversarial Classification.Bo Li; Yevgeniy Vorobeychik; Xinyun Chen 2016-03-16 Suppressing the Unusual: towards Robust CNNs using Symmetric Activation Functions.Qiyang Zhao; Lewis D Griffin 2016-02-08 Practical Black-Box Attacks against Machine Learning.Nicolas Papernot; Patrick McDaniel; Ian Goodfellow; Somesh Jha; Z. Berkay Celik; Ananthram Swami 2016-02-07 Ensemble Robustness and Generalization of Stochastic Deep Learning Algorithms.Tom Zahavy; Bingyi Kang; Alex Sivak; Jiashi Feng; Huan Xu; Shie Mannor 2016-01-26 Unifying Adversarial Training Algorithms with Flexible Deep Data Gradient Regularization.Alexander G. II Ororbia; C. Lee Giles; Daniel Kifer 2015-11-23 The Limitations of Deep Learning in Adversarial Settings.Nicolas Papernot; Patrick McDaniel; Somesh Jha; Matt Fredrikson; Z. Berkay Celik; Ananthram Swami 2015-11-19 A Unified Gradient Regularization Family for Adversarial Examples.Chunchuan Lyu; Kaizhu Huang; Hai-Ning Liang Manifold Regularized Deep Neural Networks using Adversarial Examples.Taehoon Lee; Minsuk Choi; Sungroh Yoon Robust Convolutional Neural Networks under Adversarial Noise.Jonghoon Jin; Aysegul Dundar; Eugenio Culurciello Foveation-based Mechanisms Alleviate Adversarial Examples.Yan Luo; Xavier Boix; Gemma Roig; Tomaso Poggio; Qi Zhao Towards Open Set Deep Networks.Abhijit Bendale; Terrance Boult 2015-11-17 Understanding Adversarial Training: Increasing Local Stability of Neural Nets through Robust Optimization.Uri Shaham; Yutaro Yamada; Sahand Negahban 2015-11-16 Adversarial Manipulation of Deep Representations.Sara Sabour; Yanshuai Cao; Fartash Faghri; David J. Fleet 2015-11-14 DeepFool: a simple and accurate method to fool deep neural networks.Seyed-Mohsen Moosavi-Dezfooli; Alhussein Fawzi; Pascal Frossard 2015-11-13 Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.Nicolas Papernot; Patrick McDaniel; Xi Wu; Somesh Jha; Ananthram Swami 2015-11-10 Learning with a Strong Adversary.Ruitong Huang; Bing Xu; Dale Schuurmans; Csaba Szepesvari 2015-10-18 Exploring the Space of Adversarial Images.Pedro Tabacof; Eduardo Valle 2015-10-14 Improving Back-Propagation by Adding an Adversarial Gradient.Arild Nøkland 2015-07-16 Deep Learning and Music Adversaries.Corey Kereliuk; Bob L. Sturm; Jan Larsen 2015-02-09 Analysis of classifiers' robustness to adversarial perturbations.Alhussein Fawzi; Omar Fawzi; Pascal Frossard 2014-12-19 Explaining and Harnessing Adversarial Examples.Ian J. Goodfellow; Jonathon Shlens; Christian Szegedy 2014-12-11 Towards Deep Neural Network Architectures Robust to Adversarial Examples.Shixiang Gu; Luca Rigazio 2014-12-05 Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images.Anh Nguyen; Jason Yosinski; Jeff Clune 2014-01-29 Security Evaluation of Support Vector Machines in Adversarial Environments.Battista Biggio; Igino Corona; Blaine Nelson; Benjamin I. P. Rubinstein; Davide Maiorca; Giorgio Fumera; Giorgio Giacinto; and Fabio Roli 2013-12-20 Intriguing properties of neural networks.Christian Szegedy; Wojciech Zaremba; Ilya Sutskever; Joan Bruna; Dumitru Erhan; Ian Goodfellow; Rob Fergus

If you want to be notified the next time I write something (maybe like this, maybe not, who knows) enter your email address here.
There's also an RSS Feed if that's your thing.