Characterizing Audio Adversarial Examples Using Temporal DependencyInternational Conference on Learning Representations (ICLR), 2018 |
Low Frequency Adversarial PerturbationConference on Uncertainty in Artificial Intelligence (UAI), 2018 |
Why Do Adversarial Attacks Transfer? Explaining Transferability of
Evasion and Poisoning Attacks Ambra Demontis Marco Melis Maura Pintor Matthew Jagielski Battista Biggio Alina Oprea Cristina Nita-Rotaru Fabio Roli |
Adaptive Adversarial Attack on Scene Text RecognitionConference on Computer Communications Workshops (INFOCOM), 2018 |
Local Gradients Smoothing: Defense against localized adversarial attacksIEEE Workshop/Winter Conference on Applications of Computer Vision (WACV), 2018 |