Giter Site home page Giter Site logo

advpaperroadmap's Introduction

Papers Reading Roadmap: Adversarial Example Generation in Deep Neural Networks (DNNs).

Deep neural networks (DNNs) have been found to be vulnerable againset adversarial examples. Here I collected all the papers in the areas of adversarial example generation and the corresponding adversarial attack defense studies.

I would continue adding papers to this roadmap.


1 Adversarial Example Generation

1.0 Background

[0] Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, Rob Fergus. "Intriguing properties of neural networks." ArXiv 2013. [pdf] (Background in this area) ⭐⭐⭐⭐⭐

1.1 Fast Gradient Based Methods

[1] Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. "Explaining and harnessing adversarial examples." ICLR 2015. [pdf] (First work in adversarial example generation.) ⭐⭐⭐⭐⭐

[2] Alexey Kurakin, Ian Goodfellow, and Samy Bengio. "Adversarial examples in the physical world." ICLR Workshop 2017. [pdf] (Based on FGSM, two additional algorithms) ⭐⭐

1.2 Optimzation Based Methods

[3] Nicholas Carlini and David Wagner. "Towards evaluating the robustness of neural networks." IEEE Symposium on Security and Privacy 2017. [pdf] (Optimization based method) ⭐⭐⭐

[4] Yanpei Liu, Xinyun Chen, Chang Liu, and Dawn Song. "Delving into transferable adversarial examples and black-box attacks." ICLR 2017. [pdf] (Optimization based method) ⭐⭐⭐⭐

[5] Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami. "Practical Black-Box Attacks against Machine Learning." Asia CCS 2017. [pdf] (Optimization based method) ⭐⭐

[6] Nicolas Papernot, Patrick McDaniel, Ian Goodfellow. "Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples." ArXiv 2016. [pdf] (Optimization based method) ⭐⭐

1.3 Generative Adversarial Networks (GAN)

[7] Anonymous Authors. "Generating Adversarial Examples with Adversarial Networks." ICLR 2018 (Rejected). [pdf] (GAN-based work) ⭐⭐⭐

[8] Zhengli Zhao, Dheeru Dua, and Sameer Singh. "Generating Natural Adversarial Examples." ICLR 2018. [pdf] (Natural adversarial image generation) ⭐⭐⭐⭐

[9] Weiwei Hu and Ying Tan. "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN." ArXiv 2017. [pdf] (GAN-based work) ⭐⭐⭐⭐

1.4 Evolutionary Algorithms

This part will be finished soon.

1.5 Adversarial Example in NLP

[10] Robin Jia and Percy Liang. "Adversarial Examples for Evaluating Reading Comprehension Systems." EMNLP 2017. [pdf] (First work of adversarial example in QA) ⭐⭐⭐

[11] Volodymyr Kuleshov, Shantanu Thakoor, Tingfung Lau, Stefano Ermon. "Adversarial Examples for Natural Language Classification Problems." ICLR 2018 (Rejected). [pdf] (NLP work)

2 Adversarial Attack Defense

This part will be finished soon.

advpaperroadmap's People

Contributors

xuczhang avatar

Watchers

James Cloos avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.