Doctoral Consortium of WSDM'22: Exploring the Bias of Adversarial Defenses
Abstract
References
Index Terms
- Doctoral Consortium of WSDM'22: Exploring the Bias of Adversarial Defenses
Recommendations
Detect and defense against adversarial examples in deep learning using natural scene statistics and adaptive denoising
AbstractDespite the enormous performance of deep neural networks (DNNs), recent studies have shown their vulnerability to adversarial examples (AEs), i.e., carefully perturbed inputs designed to fool the targeted DNN. Currently, the literature is rich ...
POBA-GA: Perturbation optimized black-box adversarial attacks via genetic algorithm
AbstractMost deep learning models are easily vulnerable to adversarial attacks. Various adversarial attacks are designed to evaluate the robustness of models and develop defense model. Currently, adversarial attacks are brought up to attack ...
Attack as defense: characterizing adversarial examples using robustness
ISSTA 2021: Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and AnalysisAs a new programming paradigm, deep learning has expanded its application to many real-world problems. At the same time, deep learning based software are found to be vulnerable to adversarial attacks. Though various defense mechanisms have been proposed ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/7c5dcf1c-6ad2-4a71-8d3a-e0206cc1373d/3488560.cover.jpg)
- General Chairs:
- K. Selcuk Candan,
- Huan Liu,
- Program Chairs:
- Leman Akoglu,
- Xin Luna Dong,
- Jiliang Tang
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Extended-abstract
Conference
Acceptance Rates
Upcoming Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 78Total Downloads
- Downloads (Last 12 months)10
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in