Adaptive Generation of Unrestricted Adversarial Inputs Authors: Isaac Dunn, Hadrien Pouget, Tom Melham, Daniel Kroening | Published: 2019-05-07 | Updated: 2019-10-01 2019.05.07 2025.05.28 Literature Database
Machine Learning Cryptanalysis of a Quantum Random Number Generator Authors: Nhan Duy Truong, Jing Yan Haw, Syed Muhamad Assad, Ping Koy Lam, Omid Kavehei | Published: 2019-05-07 | Updated: 2019-05-13 2019.05.07 2025.05.28 Literature Database
Adversarial Examples Are Not Bugs, They Are Features Authors: Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Logan Engstrom, Brandon Tran, Aleksander Madry | Published: 2019-05-06 | Updated: 2019-08-12 2019.05.06 2025.05.28 Literature Database
Cognitive Triaging of Phishing Attacks Authors: Amber van der Heijden, Luca Allodi | Published: 2019-05-06 | Updated: 2019-05-29 2019.05.06 2025.05.28 Literature Database
Privacy-Preserving Deep Neural Networks with Pixel-based Image Encryption Considering Data Augmentation in the Encrypted Domain Authors: Warit Sirichotedumrong, Takahiro Maekawa, Yuma Kinoshita, Hitoshi Kiya | Published: 2019-05-06 2019.05.06 2025.05.28 Literature Database
Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples Authors: Vikash Sehwag, Arjun Nitin Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, Prateek Mittal | Published: 2019-05-05 2019.05.05 2025.05.28 Literature Database
CharBot: A Simple and Effective Method for Evading DGA Classifiers Authors: Jonathan Peck, Claire Nie, Raaghavi Sivaguru, Charles Grumer, Femi Olumofin, Bin Yu, Anderson Nascimento, Martine De Cock | Published: 2019-05-03 | Updated: 2019-05-30 2019.05.03 2025.05.28 Literature Database
Locally Differentially Private Naive Bayes Classification Authors: Emre Yilmaz, Mohammad Al-Rubaie, J. Morris Chang | Published: 2019-05-03 2019.05.03 2025.05.28 Literature Database
Transfer of Adversarial Robustness Between Perturbation Types Authors: Daniel Kang, Yi Sun, Tom Brown, Dan Hendrycks, Jacob Steinhardt | Published: 2019-05-03 2019.05.03 2025.05.28 Literature Database
Generative Adversarial Network for Wireless Signal Spoofing Authors: Yi Shi, Kemal Davaslioglu, Yalin E. Sagduyu | Published: 2019-05-03 | Updated: 2019-05-07 2019.05.03 2025.05.28 Literature Database