Adversarial Attack
Adversarial attacks aim to deceive machine learning models by subtly altering input data, causing misclassifications or other erroneous outputs. Current research focuses on developing more robust models and detection methods, exploring various attack strategies across different model architectures (including vision transformers, recurrent neural networks, and graph neural networks) and data types (images, text, signals, and tabular data). Understanding and mitigating these attacks is crucial for ensuring the reliability and security of AI systems in diverse applications, from autonomous vehicles to medical diagnosis and cybersecurity.
Papers
Dynamic Transformers Provide a False Sense of Efficiency
Yiming Chen, Simin Chen, Zexin Li, Wei Yang, Cong Liu, Robby T. Tan, Haizhou Li
SneakyPrompt: Jailbreaking Text-to-image Generative Models
Yuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao
Multi-Task Models Adversarial Attacks
Lijun Zhang, Xiao Liu, Kaleel Mahmood, Caiwen Ding, Hui Guan
Quantifying the robustness of deep multispectral segmentation models against natural perturbations and data poisoning
Elise Bishoff, Charles Godfrey, Myles McKay, Eleanor Byler
Attacks on Online Learners: a Teacher-Student Analysis
Riccardo Giuseppe Margiotta, Sebastian Goldt, Guido Sanguinetti
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation
Soumyadeep Hore, Jalal Ghadermazi, Diwas Paudel, Ankit Shah, Tapas K. Das, Nathaniel D. Bastian
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana C. Costa, Tiago Roxo, Hugo Proença, Pedro R. M. Inácio
Towards an Accurate and Secure Detector against Adversarial Perturbations
Chao Wang, Shuren Qi, Zhiqiu Huang, Yushu Zhang, Rushi Lan, Xiaochun Cao
Adversarial Amendment is the Only Force Capable of Transforming an Enemy into a Friend
Chong Yu, Tao Chen, Zhongxue Gan
Content-based Unrestricted Adversarial Attack
Zhaoyu Chen, Bo Li, Shuang Wu, Kaixun Jiang, Shouhong Ding, Wenqiang Zhang
Diffusion Models for Imperceptible and Transferable Adversarial Attack
Jianqi Chen, Hao Chen, Keyan Chen, Yilan Zhang, Zhengxia Zou, Zhenwei Shi
Improving Defensive Distillation using Teacher Assistant
Maniratnam Mandal, Suna Gao
On enhancing the robustness of Vision Transformers: Defensive Diffusion
Raza Imam, Muhammad Huzaifa, Mohammed El-Amine Azz