RED-Attack: Resource efficient decision based attack for machine learning
Due to data dependency and model leakage properties, Deep Neural Networks (DNNs)
exhibit several security vulnerabilities. Several security attacks exploited them but most of …
exhibit several security vulnerabilities. Several security attacks exploited them but most of …
Qeba: Query-efficient boundary-based blackbox attack
Abstract Machine learning (ML), especially deep neural networks (DNNs) have been widely
used in various applications, including several safety-critical ones (eg autonomous driving) …
used in various applications, including several safety-critical ones (eg autonomous driving) …
Query-efficient meta attack to deep neural networks
Black-box attack methods aim to infer suitable attack patterns to targeted DNN models by
only using output feedback of the models and the corresponding input queries. However …
only using output feedback of the models and the corresponding input queries. However …
Fadec: A fast decision-based attack for adversarial machine learning
Due to the excessive use of cloud-based machine learning (ML) services, the smart cyber-
physical systems (CPS) are increasingly becoming vulnerable to black-box attacks on their …
physical systems (CPS) are increasingly becoming vulnerable to black-box attacks on their …
[HTML][HTML] Abcattack: a gradient-free optimization black-box attack for fooling deep image classifiers
The vulnerability of deep neural network (DNN)-based systems makes them susceptible to
adversarial perturbation and may cause classification task failure. In this work, we propose …
adversarial perturbation and may cause classification task failure. In this work, we propose …
[HTML][HTML] Uncertainty as a Swiss army knife: new adversarial attack and defense ideas based on epistemic uncertainty
Although state-of-the-art deep neural network models are known to be robust to random
perturbations, it was verified that these architectures are indeed quite vulnerable to …
perturbations, it was verified that these architectures are indeed quite vulnerable to …
On the effectiveness of small input noise for defending against query-based black-box attacks
While deep neural networks show unprecedented performance in various tasks, the
vulnerability to adversarial examples hinders their deployment in safety-critical systems …
vulnerability to adversarial examples hinders their deployment in safety-critical systems …
TrISec: training data-unaware imperceptible security attacks on deep neural networks
Most of the data manipulation attacks on deep neural networks (DNNs) during the training
stage introduce a perceptible noise that can be catered by preprocessing during inference …
stage introduce a perceptible noise that can be catered by preprocessing during inference …
Learning adversary-resistant deep neural networks
Deep neural networks (DNNs) have proven to be quite effective in a vast array of machine
learning tasks, with recent examples in cyber security and autonomous vehicles. Despite the …
learning tasks, with recent examples in cyber security and autonomous vehicles. Despite the …
Random directional attack for fooling deep neural networks
Deep neural networks (DNNs) have been widely used in many fields such as images
processing, speech recognition; however, they are vulnerable to adversarial examples, and …
processing, speech recognition; however, they are vulnerable to adversarial examples, and …