A Review of Machine Learning Applications in Fuzzing Authors: Gary J Saavedra, Kathryn N Rodhouse, Daniel M Dunlavy, Philip W Kegelmeyer | Published: 2019-06-13 | Updated: 2019-10-09 2019.06.13 2025.05.13 Literature Database
Deep Reinforcement Learning for Cyber Security Authors: Thanh Thi Nguyen, Vijay Janapa Reddi | Published: 2019-06-13 | Updated: 2021-11-02 2019.06.13 2025.05.13 Literature Database
Evolutionary Trigger Set Generation for DNN Black-Box Watermarking Authors: Jia Guo, Miodrag Potkonjak | Published: 2019-06-11 | Updated: 2021-02-14 2019.06.11 2025.05.13 Literature Database
Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective Authors: Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, Xue Lin | Published: 2019-06-10 | Updated: 2019-10-14 2019.06.10 2025.05.13 Literature Database
Attacking Graph Convolutional Networks via Rewiring Authors: Yao Ma, Suhang Wang, Tyler Derr, Lingfei Wu, Jiliang Tang | Published: 2019-06-10 | Updated: 2019-09-28 2019.06.10 2025.05.13 Literature Database
Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers Authors: Hadi Salman, Greg Yang, Jerry Li, Pengchuan Zhang, Huan Zhang, Ilya Razenshteyn, Sebastien Bubeck | Published: 2019-06-09 | Updated: 2020-01-10 2019.06.09 2025.05.13 Literature Database
Adversarial Attack Generation Empowered by Min-Max Optimization Authors: Jingkang Wang, Tianyun Zhang, Sijia Liu, Pin-Yu Chen, Jiacen Xu, Makan Fardad, Bo Li | Published: 2019-06-09 | Updated: 2021-11-01 2019.06.09 2025.05.13 Literature Database
Real or Fake? Learning to Discriminate Machine from Human Generated Text Authors: Anton Bakhtin, Sam Gross, Myle Ott, Yuntian Deng, Marc'Aurelio Ranzato, Arthur Szlam | Published: 2019-06-07 | Updated: 2019-11-25 2019.06.07 2025.05.13 Literature Database
Robustness for Non-Parametric Classification: A Generic Attack and Defense Authors: Yao-Yuan Yang, Cyrus Rashtchian, Yizhen Wang, Kamalika Chaudhuri | Published: 2019-06-07 | Updated: 2020-02-24 2019.06.07 2025.05.13 Literature Database
A cryptographic approach to black box adversarial machine learning Authors: Kevin Shi, Daniel Hsu, Allison Bishop | Published: 2019-06-07 | Updated: 2020-02-21 2019.06.07 2025.05.13 Literature Database