私の備忘録がないわね...私の...

画像処理とかプログラミングのお話。

AAAI16~20のadversarial examples関連論文リンク集

目視で判断したので、間違っていたり抜けてたりするかもしれませんが、ご容赦ください。

20

A New Ensemble Adversarial Attack Powered by Long-Term Gradient Memories | Proceedings of the AAAI Conference on Artificial Intelligence

ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System | Proceedings of the AAAI Conference on Artificial Intelligence

A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks | Proceedings of the AAAI Conference on Artificial Intelligence

Optimal Attack against Autoregressive Models by Manipulating the Environment | Proceedings of the AAAI Conference on Artificial Intelligence

Seq2Sick: Evaluating the Robustness of Sequence-to-Sequence Models with Adversarial Examples | Proceedings of the AAAI Conference on Artificial Intelligence

Suspicion-Free Adversarial Attacks on Clustering Algorithms | Proceedings of the AAAI Conference on Artificial Intelligence

Improving the Robustness of Wasserstein Embedding by Adversarial PAC-Bayesian Learning | Proceedings of the AAAI Conference on Artificial Intelligence

Adversarially Robust Distillation | Proceedings of the AAAI Conference on Artificial Intelligence

Robust Stochastic Bandit Algorithms under Probabilistic Unbounded Adversarial Attack | Proceedings of the AAAI Conference on Artificial Intelligence

Robust Federated Learning via Collaborative Machine Teaching | Proceedings of the AAAI Conference on Artificial Intelligence

Spatiotemporally Constrained Action Space Attacks on Deep Reinforcement Learning Agents | Proceedings of the AAAI Conference on Artificial Intelligence

Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation | Proceedings of the AAAI Conference on Artificial Intelligence

Weighted-Sampling Audio Adversarial Example Attack | Proceedings of the AAAI Conference on Artificial Intelligence

Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning | Proceedings of the AAAI Conference on Artificial Intelligence

Universal Adversarial Training | Proceedings of the AAAI Conference on Artificial Intelligence

CAG: A Real-Time Low-Cost Enhanced-Robustness High-Transferability Content-Aware Adversarial Attack Generator | Proceedings of the AAAI Conference on Artificial Intelligence

Adversarial Transformations for Semi-Supervised Learning | Proceedings of the AAAI Conference on Artificial Intelligence

Towards Certificated Model Robustness Against Weight Perturbations | Proceedings of the AAAI Conference on Artificial Intelligence

ML-LOO: Detecting Adversarial Examples with Feature Attribution | Proceedings of the AAAI Conference on Artificial Intelligence

CD-UAP: Class Discriminative Universal Adversarial Perturbation | Proceedings of the AAAI Conference on Artificial Intelligence

Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent | Proceedings of the AAAI Conference on Artificial Intelligence

19

Resisting Adversarial Attacks Using Gaussian Mixture Variational Autoencoders | Proceedings of the AAAI Conference on Artificial Intelligence

AutoZOOM: Autoencoder-Based Zeroth Order Optimization Method for Attacking Black-Box Neural Networks | Proceedings of the AAAI Conference on Artificial Intelligence

Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks | Proceedings of the AAAI Conference on Artificial Intelligence

Distributionally Adversarial Attack | Proceedings of the AAAI Conference on Artificial Intelligence

Knowledge Distillation with Adversarial Samples Supporting Decision Boundary | Proceedings of the AAAI Conference on Artificial Intelligence

The Curse of Concentration in Robust Learning: Evasion and Poisoning Attacks from Concentration of Measure | Proceedings of the AAAI Conference on Artificial Intelligence

Adversarial Dropout for Recurrent Neural Networks | Proceedings of the AAAI Conference on Artificial Intelligence

The Adversarial Attack and Detection under the Fisher Information Metric | Proceedings of the AAAI Conference on Artificial Intelligence

Sparse Adversarial Perturbations for Videos | Proceedings of the AAAI Conference on Artificial Intelligence

18

Resisting Adversarial Attacks Using Gaussian Mixture Variational Autoencoders | Proceedings of the AAAI Conference on Artificial Intelligence

AutoZOOM: Autoencoder-Based Zeroth Order Optimization Method for Attacking Black-Box Neural Networks | Proceedings of the AAAI Conference on Artificial Intelligence

Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks | Proceedings of the AAAI Conference on Artificial Intelligence

Distributionally Adversarial Attack | Proceedings of the AAAI Conference on Artificial Intelligence

Knowledge Distillation with Adversarial Samples Supporting Decision Boundary | Proceedings of the AAAI Conference on Artificial Intelligence

The Curse of Concentration in Robust Learning: Evasion and Poisoning Attacks from Concentration of Measure | Proceedings of the AAAI Conference on Artificial Intelligence

Adversarial Dropout for Recurrent Neural Networks | Proceedings of the AAAI Conference on Artificial Intelligence

The Adversarial Attack and Detection under the Fisher Information Metric | Proceedings of the AAAI Conference on Artificial Intelligence

Sparse Adversarial Perturbations for Videos | Proceedings of the AAAI Conference on Artificial Intelligence

17

[1705.08378] Detecting Adversarial Image Examples in Deep Networks with Adaptive Noise Reduction

[1803.00401] Unravelling Robustness of Deep Learning based Face Recognition Against Adversarial Attacks

[1709.04114] EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples

[1801.04693] Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks

[1711.09404] Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing their Input Gradients

Learning to Attack: Adversarial Transformation Networks

16

(PDF) Multi-Defender Strategic Filtering Against Spear-Phishing Attacks

[PDF] Data Poisoning Attacks against Autoregressive Models | Semantic Scholar