Adversarial machine learning for network intrusion detection systems: A comprehensive survey
Network-based Intrusion Detection System (NIDS) forms the frontline defence against
network attacks that compromise the security of the data, systems, and networks. In recent …
network attacks that compromise the security of the data, systems, and networks. In recent …
Adversarial attacks and defenses in images, graphs and text: A review
Deep neural networks (DNN) have achieved unprecedented success in numerous machine
learning tasks in various domains. However, the existence of adversarial examples raises …
learning tasks in various domains. However, the existence of adversarial examples raises …
A simple and effective pruning approach for large language models
As their size increases, Large Languages Models (LLMs) are natural candidates for network
pruning methods: approaches that drop a subset of network weights while striving to …
pruning methods: approaches that drop a subset of network weights while striving to …
Gan inversion: A survey
GAN inversion aims to invert a given image back into the latent space of a pretrained GAN
model so that the image can be faithfully reconstructed from the inverted code by the …
model so that the image can be faithfully reconstructed from the inverted code by the …
On adaptive attacks to adversarial example defenses
Adaptive attacks have (rightfully) become the de facto standard for evaluating defenses to
adversarial examples. We find, however, that typical adaptive evaluations are incomplete …
adversarial examples. We find, however, that typical adaptive evaluations are incomplete …
Improving adversarial robustness requires revisiting misclassified examples
Deep neural networks (DNNs) are vulnerable to adversarial examples crafted by
imperceptible perturbations. A range of defense techniques have been proposed to improve …
imperceptible perturbations. A range of defense techniques have been proposed to improve …
Adversarial training for free!
Adversarial training, in which a network is trained on adversarial examples, is one of the few
defenses against adversarial attacks that withstands strong attacks. Unfortunately, the high …
defenses against adversarial attacks that withstands strong attacks. Unfortunately, the high …
Theoretically principled trade-off between robustness and accuracy
We identify a trade-off between robustness and accuracy that serves as a guiding principle
in the design of defenses against adversarial examples. Although this problem has been …
in the design of defenses against adversarial examples. Although this problem has been …
[HTML][HTML] Adversarial attacks and defenses in deep learning
With the rapid developments of artificial intelligence (AI) and deep learning (DL) techniques,
it is critical to ensure the security and robustness of the deployed algorithms. Recently, the …
it is critical to ensure the security and robustness of the deployed algorithms. Recently, the …
Hopskipjumpattack: A query-efficient decision-based attack
The goal of a decision-based adversarial attack on a trained model is to generate
adversarial examples based solely on observing output labels returned by the targeted …
adversarial examples based solely on observing output labels returned by the targeted …