ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1810.00069
  4. Cited By
Adversarial Attacks and Defences: A Survey

Adversarial Attacks and Defences: A Survey

28 September 2018
Anirban Chakraborty
Manaar Alam
Vishal Dey
Anupam Chattopadhyay
Debdeep Mukhopadhyay
    AAML
    OOD
ArXivPDFHTML

Papers citing "Adversarial Attacks and Defences: A Survey"

50 / 110 papers shown
Title
Statistical Detection of Adversarial examples in Blockchain-based
  Federated Forest In-vehicle Network Intrusion Detection Systems
Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems
I. Aliyu
Sélinde Van Engelenburg
Muhammed Muazu
Jinsul Kim
C. Lim
AAML
41
14
0
11 Jul 2022
Certifiably Robust Policy Learning against Adversarial Communication in
  Multi-agent Systems
Certifiably Robust Policy Learning against Adversarial Communication in Multi-agent Systems
Yanchao Sun
Ruijie Zheng
Parisa Hassanzadeh
Yongyuan Liang
S. Feizi
Sumitra Ganesh
Furong Huang
AAML
31
10
0
21 Jun 2022
Transferable Graph Backdoor Attack
Transferable Graph Backdoor Attack
Shuiqiao Yang
Bao Gia Doan
Paul Montague
O. Vel
Tamas Abraham
S. Çamtepe
Damith C. Ranasinghe
S. Kanhere
AAML
41
36
0
21 Jun 2022
Hide and Seek: on the Stealthiness of Attacks against Deep Learning
  Systems
Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems
Zeyan Liu
Fengjun Li
Jingqiang Lin
Zhu Li
Bo Luo
AAML
15
1
0
31 May 2022
Problem-Space Evasion Attacks in the Android OS: a Survey
Problem-Space Evasion Attacks in the Android OS: a Survey
Harel Berger
Chen Hajaj
A. Dvir
25
2
0
29 May 2022
SoK: On the Semantic AI Security in Autonomous Driving
SoK: On the Semantic AI Security in Autonomous Driving
Junjie Shen
Ningfei Wang
Ziwen Wan
Yunpeng Luo
Takami Sato
...
Zhenyu Zhong
Kang Li
Ziming Zhao
Chunming Qiao
Qi Alfred Chen
AAML
23
40
0
10 Mar 2022
Defending Black-box Skeleton-based Human Activity Classifiers
Defending Black-box Skeleton-based Human Activity Classifiers
He Wang
Yunfeng Diao
Zichang Tan
G. Guo
AAML
51
10
0
09 Mar 2022
Improving Health Mentioning Classification of Tweets using Contrastive
  Adversarial Training
Improving Health Mentioning Classification of Tweets using Contrastive Adversarial Training
Pervaiz Iqbal Khan
Shoaib Ahmed Siddiqui
Imran Razzak
Andreas Dengel
Sheraz Ahmed
21
3
0
03 Mar 2022
StratDef: Strategic Defense Against Adversarial Attacks in ML-based
  Malware Detection
StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection
Aqib Rashid
Jose Such
AAML
24
5
0
15 Feb 2022
Deadwooding: Robust Global Pruning for Deep Neural Networks
Deadwooding: Robust Global Pruning for Deep Neural Networks
Sawinder Kaur
Ferdinando Fioretto
Asif Salekin
19
4
0
10 Feb 2022
Distributionally Robust Fair Principal Components via Geodesic Descents
Distributionally Robust Fair Principal Components via Geodesic Descents
Hieu Vu
Toan M. Tran
Man-Chung Yue
Viet Anh Nguyen
19
14
0
07 Feb 2022
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object
  Detectors in the Physical World
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Hua Ma
Yinshan Li
Yansong Gao
A. Abuadbba
Zhi-Li Zhang
Anmin Fu
Hyoungshick Kim
S. Al-Sarawi
N. Surya
Derek Abbott
21
34
0
21 Jan 2022
Security for Machine Learning-based Software Systems: a survey of
  threats, practices and challenges
Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges
Huaming Chen
Muhammad Ali Babar
AAML
37
21
0
12 Jan 2022
Robust Natural Language Processing: Recent Advances, Challenges, and
  Future Directions
Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions
Marwan Omar
Soohyeon Choi
Daehun Nyang
David A. Mohaisen
32
57
0
03 Jan 2022
Financial Vision Based Differential Privacy Applications
Financial Vision Based Differential Privacy Applications
Jun-Hao Chen
Yi-Jen Wang
Yun-Cheng Tsai
Samuel Yen-Chi Chen
FedML
21
1
0
28 Dec 2021
Stealthy Attack on Algorithmic-Protected DNNs via Smart Bit Flipping
Stealthy Attack on Algorithmic-Protected DNNs via Smart Bit Flipping
B. Ghavami
Seyd Movi
Zhenman Fang
Lesley Shannon
AAML
40
9
0
25 Dec 2021
Adversarial Attacks against Windows PE Malware Detection: A Survey of
  the State-of-the-Art
Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Xiang Ling
Lingfei Wu
Jiangyu Zhang
Zhenqing Qu
Wei Deng
...
Chunming Wu
S. Ji
Tianyue Luo
Jingzheng Wu
Yanjun Wu
AAML
34
73
0
23 Dec 2021
Explainable Deep Learning in Healthcare: A Methodological Survey from an
  Attribution View
Explainable Deep Learning in Healthcare: A Methodological Survey from an Attribution View
Di Jin
Elena Sergeeva
W. Weng
Geeticka Chauhan
Peter Szolovits
OOD
39
55
0
05 Dec 2021
Human Imperceptible Attacks and Applications to Improve Fairness
Human Imperceptible Attacks and Applications to Improve Fairness
Xinru Hua
Huanzhong Xu
Jose H. Blanchet
V. Nguyen
AAML
27
3
0
30 Nov 2021
Meta-Learning the Search Distribution of Black-Box Random Search Based
  Adversarial Attacks
Meta-Learning the Search Distribution of Black-Box Random Search Based Adversarial Attacks
Maksym Yatsura
J. H. Metzen
Matthias Hein
OOD
26
14
0
02 Nov 2021
Trustworthy AI: From Principles to Practices
Trustworthy AI: From Principles to Practices
Bo-wen Li
Peng Qi
Bo Liu
Shuai Di
Jingen Liu
Jiquan Pei
Jinfeng Yi
Bowen Zhou
119
356
0
04 Oct 2021
Simple Post-Training Robustness Using Test Time Augmentations and Random
  Forest
Simple Post-Training Robustness Using Test Time Augmentations and Random Forest
Gilad Cohen
Raja Giryes
AAML
35
4
0
16 Sep 2021
2-in-1 Accelerator: Enabling Random Precision Switch for Winning Both Adversarial Robustness and Efficiency
2-in-1 Accelerator: Enabling Random Precision Switch for Winning Both Adversarial Robustness and Efficiency
Yonggan Fu
Yang Katie Zhao
Qixuan Yu
Chaojian Li
Yingyan Lin
AAML
52
12
0
11 Sep 2021
Imbalanced Adversarial Training with Reweighting
Imbalanced Adversarial Training with Reweighting
Wentao Wang
Han Xu
Xiaorui Liu
Yaxin Li
B. Thuraisingham
Jiliang Tang
37
16
0
28 Jul 2021
Improved Text Classification via Contrastive Adversarial Training
Improved Text Classification via Contrastive Adversarial Training
Lin Pan
Chung-Wei Hang
Avirup Sil
Saloni Potdar
AAML
26
86
0
21 Jul 2021
Adversarial Attack for Uncertainty Estimation: Identifying Critical
  Regions in Neural Networks
Adversarial Attack for Uncertainty Estimation: Identifying Critical Regions in Neural Networks
Ismail Alarab
S. Prakoonwit
AAML
27
14
0
15 Jul 2021
Model Transferability With Responsive Decision Subjects
Model Transferability With Responsive Decision Subjects
Yatong Chen
Zeyu Tang
Kun Zhang
Yang Liu
41
10
0
13 Jul 2021
Trustworthy AI: A Computational Perspective
Trustworthy AI: A Computational Perspective
Haochen Liu
Yiqi Wang
Wenqi Fan
Xiaorui Liu
Yaxin Li
Shaili Jain
Yunhao Liu
Anil K. Jain
Jiliang Tang
FaML
104
196
0
12 Jul 2021
Survey: Leakage and Privacy at Inference Time
Survey: Leakage and Privacy at Inference Time
Marija Jegorova
Chaitanya Kaul
Charlie Mayor
Alison Q. OÑeil
Alexander Weir
Roderick Murray-Smith
Sotirios A. Tsaftaris
PILM
MIACV
23
71
0
04 Jul 2021
The Threat of Offensive AI to Organizations
The Threat of Offensive AI to Organizations
Yisroel Mirsky
Ambra Demontis
J. Kotak
Ram Shankar
Deng Gelei
Liu Yang
Xinming Zhang
Wenke Lee
Yuval Elovici
Battista Biggio
33
81
0
30 Jun 2021
Reveal of Vision Transformers Robustness against Adversarial Attacks
Reveal of Vision Transformers Robustness against Adversarial Attacks
Ahmed Aldahdooh
W. Hamidouche
Olivier Déforges
ViT
15
56
0
07 Jun 2021
Ensemble-in-One: Learning Ensemble within Random Gated Networks for
  Enhanced Adversarial Robustness
Ensemble-in-One: Learning Ensemble within Random Gated Networks for Enhanced Adversarial Robustness
Yi Cai
Xuefei Ning
Huazhong Yang
Yu Wang
AAML
27
4
0
27 Mar 2021
Black-box Detection of Backdoor Attacks with Limited Information and
  Data
Black-box Detection of Backdoor Attacks with Limited Information and Data
Yinpeng Dong
Xiao Yang
Zhijie Deng
Tianyu Pang
Zihao Xiao
Hang Su
Jun Zhu
AAML
21
112
0
24 Mar 2021
Explainable Adversarial Attacks in Deep Neural Networks Using Activation
  Profiles
Explainable Adversarial Attacks in Deep Neural Networks Using Activation Profiles
G. Cantareira
R. Mello
F. Paulovich
AAML
24
9
0
18 Mar 2021
Towards Robust and Reliable Algorithmic Recourse
Towards Robust and Reliable Algorithmic Recourse
Sohini Upadhyay
Shalmali Joshi
Himabindu Lakkaraju
25
108
0
26 Feb 2021
Technical Report -- Expected Exploitability: Predicting the Development
  of Functional Vulnerability Exploits
Technical Report -- Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits
Octavian Suciu
Connor Nelson
Zhuo Lyu
Tiffany Bao
Tudor Dumitras
8
36
0
15 Feb 2021
Universal Adversarial Examples and Perturbations for Quantum Classifiers
Universal Adversarial Examples and Perturbations for Quantum Classifiers
Weiyuan Gong
D. Deng
AAML
32
23
0
15 Feb 2021
Resilient Machine Learning for Networked Cyber Physical Systems: A
  Survey for Machine Learning Security to Securing Machine Learning for CPS
Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS
Felix O. Olowononi
D. Rawat
Chunmei Liu
34
132
0
14 Feb 2021
Adversarial Attack on Network Embeddings via Supervised Network
  Poisoning
Adversarial Attack on Network Embeddings via Supervised Network Poisoning
Viresh Gupta
Tanmoy Chakraborty
AAML
36
12
0
14 Feb 2021
Exacerbating Algorithmic Bias through Fairness Attacks
Exacerbating Algorithmic Bias through Fairness Attacks
Ninareh Mehrabi
Muhammad Naveed
Fred Morstatter
Aram Galstyan
AAML
28
67
0
16 Dec 2020
A case for new neural network smoothness constraints
A case for new neural network smoothness constraints
Mihaela Rosca
T. Weber
Arthur Gretton
S. Mohamed
AAML
35
48
0
14 Dec 2020
GreedyFool: Distortion-Aware Sparse Adversarial Attack
GreedyFool: Distortion-Aware Sparse Adversarial Attack
Xiaoyi Dong
Dongdong Chen
Jianmin Bao
Chuan Qin
Lu Yuan
Weiming Zhang
Nenghai Yu
Dong Chen
AAML
18
63
0
26 Oct 2020
Dynamic Adversarial Patch for Evading Object Detection Models
Dynamic Adversarial Patch for Evading Object Detection Models
Shahar Hoory
T. Shapira
A. Shabtai
Yuval Elovici
AAML
18
40
0
25 Oct 2020
Global Optimization of Objective Functions Represented by ReLU Networks
Global Optimization of Objective Functions Represented by ReLU Networks
Christopher A. Strong
Haoze Wu
Aleksandar Zeljić
Kyle D. Julian
Guy Katz
Clark W. Barrett
Mykel J. Kochenderfer
AAML
17
33
0
07 Oct 2020
Query complexity of adversarial attacks
Query complexity of adversarial attacks
Grzegorz Gluch
R. Urbanke
AAML
19
5
0
02 Oct 2020
Crafting Adversarial Examples for Deep Learning Based Prognostics
  (Extended Version)
Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version)
Gautam Raj Mode
K. A. Hoque
AAML
14
17
0
21 Sep 2020
SoK: Certified Robustness for Deep Neural Networks
SoK: Certified Robustness for Deep Neural Networks
Linyi Li
Tao Xie
Bo-wen Li
AAML
33
128
0
09 Sep 2020
Adversarial Machine Learning in Image Classification: A Survey Towards
  the Defender's Perspective
Adversarial Machine Learning in Image Classification: A Survey Towards the Defender's Perspective
G. R. Machado
Eugênio Silva
R. Goldschmidt
AAML
33
156
0
08 Sep 2020
Optimizing Information Loss Towards Robust Neural Networks
Optimizing Information Loss Towards Robust Neural Networks
Philip Sperl
Konstantin Böttinger
AAML
18
3
0
07 Aug 2020
On Adversarial Robustness: A Neural Architecture Search perspective
On Adversarial Robustness: A Neural Architecture Search perspective
Chaitanya Devaguptapu
Devansh Agarwal
Gaurav Mittal
Pulkit Gopalani
V. Balasubramanian
OOD
AAML
12
33
0
16 Jul 2020
Previous
123
Next