Review Article

A Survey on Adversarial Attack in the Age of Artificial Intelligence

Table 9

The connections between papers.

TypeAuthorTime/published inConnection

ImageMahmood Sharif et al. [50]2016/CCSIn the field of image, papers of CCF A and B conferences and top journals in the field of security were selected, covering the papers of nearly five years from 2016 to 2020, involving offense and defense, and being able to understand the frontier research in the field of adversarial machine learning.
Nicolas Papernot et al. [51]2017/CCS
Ali Shafahi et al. [52]2018/NIPS
Yossi Adi et al. [87]2018/USENIX
Yisroel Mirsky et al. [53]2019/USENIX
Shang-Tse Chen et al. [54]2019/ECML PKDD
Qixue Xiao et al. [55]2019/USENIX
Yajie Wang et al. [56]2020/JNCA
Jesús Solano et al. [57]2020/CCS
Chang Liao et al. [80]2020/CCS
Ilia Shumailov et al. [73]2020/CCS
An Ju et al. [68]2020/CCS

TextJavid Ebrahimi et al. [26]2018/ACLIn the field of text, 6 papers including [30] are selected, with [30] as the core. Among the 40 related papers, 6 papers are selected, among which three [26, 58, 115] quoted by [30] are cited by [59, 60].
Ji Gao et al. [115]2018/SPW
Minhao Cheng et al. [58]2018/AAAI
Jinfeng Li et al. [30]2019/NDSS
Huangzhao Zhang et al. [59]2019/ACL
Yuan Zang et al. [60]2020/ACL

MalwareWeiwei Hu et al. [44]2017/arXivThese papers are about malware adversarial machine learning found through connected papers. Among them, [4446] are the papers based on windows platform. [48] is the paper related to binary malware adversarial examples. [47, 49] are similar to the same review on Windows PE file generation adversarial examples. The remaining papers include top conference papers, top journal papers, and arXiv in the field of security, among which [69] is about robustness research paper.
Edward Raff et al. [61]2017/arXiv
Abdullah Al-Dujaili et al. [45]2018/arXiv
Bojan Kolosnjaji et al. [46]2018/arXiv
Wei Song et al. [47]2020/arXiv
Ishai Rosenberg et al. [48]2020/ACSAC
Mohammadreza Ebrahimi et al. [49]2020/AAAI
Thien Duc Nguyen et al. [22]2020/DISS
Luca Demetrio et al. [62]2020/arXiv
Xiao Chen et al. [63]2020/TIFS
Yizheng Chen et al. [69]2020/USENIX