Diffattack: Evasion attacks against diffusion-based adversarial purification

M Kang, D Song, B Li - Advances in Neural Information …, 2024 - proceedings.neurips.cc
Diffusion-based purification defenses leverage diffusion models to remove crafted
perturbations of adversarial examples and achieve state-of-the-art robustness. Recent …

Adversarial attack on attackers: Post-process to mitigate black-box score-based query attacks

S Chen, Z Huang, Q Tao, Y Wu… - Advances in Neural …, 2022 - proceedings.neurips.cc
The score-based query attacks (SQAs) pose practical threats to deep neural networks by
crafting adversarial perturbations within dozens of queries, only using the model's output …

Indicators of attack failure: Debugging and improving optimization of adversarial examples

M Pintor, L Demetrio, A Sotgiu… - Advances in …, 2022 - proceedings.neurips.cc
Evaluating robustness of machine-learning models to adversarial examples is a challenging
problem. Many defenses have been shown to provide a false sense of robustness by …

A2: Efficient automated attacker for boosting adversarial training

Z Xu, G Zhu, C Meng, Z Ying, W Wang… - Advances in …, 2022 - proceedings.neurips.cc
Based on the significant improvement of model robustness by AT (Adversarial Training),
various variants have been proposed to further boost the performance. Well-recognized …

Meta-learning the search distribution of black-box random search based adversarial attacks

M Yatsura, J Metzen, M Hein - Advances in Neural …, 2021 - proceedings.neurips.cc
Adversarial attacks based on randomized search schemes have obtained state-of-the-art
results in black-box robustness evaluation recently. However, as we demonstrate in this …

A multi-objective memetic algorithm for automatic adversarial attack optimization design

J Sun, W Yao, T Jiang, X Chen - Neurocomputing, 2023 - Elsevier
The phenomenon of adversarial examples has been revealed in variant scenarios. Recent
studies show that well-designed adversarial defense strategies can improve the robustness …

Data filtering for efficient adversarial training

EC Chen, CR Lee - Pattern Recognition, 2024 - Elsevier
Adversarial training has been considered to be one of the most effective strategies to defend
against adversarial attacks. Most existing adversarial training methods have shown a trade …

The space of adversarial strategies

R Sheatsley, B Hoak, E Pauley… - 32nd USENIX Security …, 2023 - usenix.org
Adversarial examples, inputs designed to induce worst-case behavior in machine learning
models, have been extensively studied over the past decade. Yet, our understanding of this …

Random and adversarial bit error robustness: Energy-efficient and secure DNN accelerators

D Stutz, N Chandramoorthy, M Hein… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Deep neural network (DNN) accelerators received considerable attention in recent years
due to the potential to save energy compared to mainstream hardware. Low-voltage …

[PDF][PDF] A halfspace-mass depth-based method for adversarial attack detection

P Colombo, M Picot, F Granese, M Romanelli… - … on Machine Learning …, 2023 - hal.science
Despite the widespread use of deep learning algorithms, vulnerability to adversarial attacks
is still an issue limiting their use in critical applications. Detecting these attacks is thus crucial …