Recent research has proposed approaches that modify speech to defend aga...
Perturbative availability poisoning (PAP) adds small changes to images t...
We introduce ShortcutGen, a new data poisoning attack that generates
sam...
Strengthening the robustness of machine learning-based malware detectors...
Recent work has shown that imperceptible perturbations can be applied to...
There is broad consensus among researchers studying adversarial examples...
We introduce screen gleaning, a TEMPEST attack in which the screen of a
...
We propose Adversarial Color Enhancement (ACE), a novel approach to
gene...
E-commerce platforms provide their customers with ranked lists of recomm...
We propose Adversarial Color Filtering (AdvCF), an approach that uses a
...
The success of image perturbations that are designed to fool image
class...
Recent breakthroughs in the field of deep learning have led to advanceme...
An adversarial query is an image that has been modified to disrupt
conte...
Identifying and correcting grammatical errors in the text written by
non...