On the Connection Between Adversarial Robustness and Saliency Map Interpretability Authors: Christian Etmann, Sebastian Lunz, Peter Maass, Carola-Bibiane Schönlieb | Published: 2019-05-10 Robust EstimationAdversarial Attack Detectionloss of Interpretability 2019.05.10 2025.05.28 Literature Database
Adversarial Defense Framework for Graph Neural Network Authors: Shen Wang, Zhengzhang Chen, Jingchao Ni, Xiao Yu, Zhichun Li, Haifeng Chen, Philip S. Yu | Published: 2019-05-09 | Updated: 2019-05-10 FrameworkPoisoningRobust Estimation 2019.05.09 2025.05.28 Literature Database
Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack Authors: Di Zhao, Jiqiang Liu, Jialin Wang, Wenjia Niu, Endong Tong, Tong Chen, Gang Li | Published: 2019-05-09 DDoS AttackAttack Scenario AnalysisMachine Learning Method 2019.05.09 2025.05.28 Literature Database
Adversarial Image Translation: Unrestricted Adversarial Examples in Face Recognition Systems Authors: Kazuya Kakizaki, Kosuke Yoshida | Published: 2019-05-09 | Updated: 2020-01-28 Factors of Performance DegradationAdversarial ExampleAdversarial Attack Detection 2019.05.09 2025.05.28 Literature Database
Reconstruction of Privacy-Sensitive Data from Protected Templates Authors: Shideh Rezaeifar, Behrooz Razeghi, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-05-08 Privacy TechniqueReconstruction AttackFactors of Performance Degradation 2019.05.08 2025.05.28 Literature Database
Adaptive Generation of Unrestricted Adversarial Inputs Authors: Isaac Dunn, Hadrien Pouget, Tom Melham, Daniel Kroening | Published: 2019-05-07 | Updated: 2019-10-01 Adversarial ExampleAdversarial Attack DetectionAdaptive Adversarial Training 2019.05.07 2025.05.28 Literature Database
Machine Learning Cryptanalysis of a Quantum Random Number Generator Authors: Nhan Duy Truong, Jing Yan Haw, Syed Muhamad Assad, Ping Koy Lam, Omid Kavehei | Published: 2019-05-07 | Updated: 2019-05-13 Data Collection MethodMachine Learning MethodQuantum Computing 2019.05.07 2025.05.28 Literature Database
Adversarial Examples Are Not Bugs, They Are Features Authors: Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Logan Engstrom, Brandon Tran, Aleksander Madry | Published: 2019-05-06 | Updated: 2019-08-12 Robust EstimationFactors of Performance DegradationAdversarial Example 2019.05.06 2025.05.28 Literature Database
Cognitive Triaging of Phishing Attacks Authors: Amber van der Heijden, Luca Allodi | Published: 2019-05-06 | Updated: 2019-05-29 Data Collection MethodPoisoningAttack Scenario Analysis 2019.05.06 2025.05.28 Literature Database
Privacy-Preserving Deep Neural Networks with Pixel-based Image Encryption Considering Data Augmentation in the Encrypted Domain Authors: Warit Sirichotedumrong, Takahiro Maekawa, Yuma Kinoshita, Hitoshi Kiya | Published: 2019-05-06 Privacy TechniqueData Augmentation in Encrypted DomainsPrivacy Protection in Machine Learning 2019.05.06 2025.05.28 Literature Database