Generating Semantic Adversarial Examples via Feature Manipulation Authors: Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen | Published: 2020-01-06 | Updated: 2022-05-20 Data GenerationAdversarial ExampleAdversarial Learning 2020.01.06 2025.05.28 Literature Database
Model Weight Theft With Just Noise Inputs: The Curious Case of the Petulant Attacker Authors: Nicholas Roberts, Vinay Uday Prabhu, Matthew McAteer | Published: 2019-12-19 Data GenerationModel DesignModel Communication 2019.12.19 2025.05.28 Literature Database
MimicGAN: Robust Projection onto Image Manifolds with Corruption Mimicking Authors: Rushil Anirudh, Jayaraman J. Thiagarajan, Bhavya Kailkhura, Timo Bremer | Published: 2019-12-16 | Updated: 2020-04-30 Data GenerationRobustnessPerformance Evaluation Metrics 2019.12.16 2025.05.28 Literature Database
DAmageNet: A Universal Adversarial Dataset Authors: Sizhe Chen, Xiaolin Huang, Zhengbao He, Chengjin Sun | Published: 2019-12-16 Data GenerationRobustnessDeep Learning Method 2019.12.16 2025.05.28 Literature Database
Pseudo Random Number Generation: a Reinforcement Learning approach Authors: Luca Pasqualini, Maurizio Parton | Published: 2019-12-15 Data GenerationReward Mechanism DesignDeep Reinforcement Learning 2019.12.15 2025.05.28 Literature Database
Expansion of Cyber Attack Data From Unbalanced Datasets Using Generative Techniques Authors: Ibrahim Yilmaz, Rahat Masum | Published: 2019-12-10 Data GenerationPerformance Evaluation MetricsMachine Learning Technology 2019.12.10 2025.05.28 Literature Database
Hardening Random Forest Cyber Detectors Against Adversarial Attacks Authors: Giovanni Apruzzese, Mauro Andreolini, Michele Colajanni, Mirco Marchetti | Published: 2019-12-09 Data GenerationRobustnessAdversarial Example 2019.12.09 2025.05.28 Literature Database
A Survey of Game Theoretic Approaches for Adversarial Machine Learning in Cybersecurity Tasks Authors: Prithviraj Dasgupta, Joseph B. Collins | Published: 2019-12-04 Data GenerationVulnerability of Adversarial ExamplesAdversarial Transferability 2019.12.04 2025.05.28 Literature Database
DeepWiFi: Cognitive WiFi with Deep Learning Authors: Kemal Davaslioglu, Sohraab Soltani, Tugba Erpek, Yalin E. Sagduyu | Published: 2019-10-29 Simulation EnvironmentData GenerationProtocol Procedure 2019.10.29 2025.05.28 Literature Database
DaiMoN: A Decentralized Artificial Intelligence Model Network Authors: Surat Teerapittayanon, H. T. Kung | Published: 2019-07-19 Data GenerationBlockchain IntegrationMachine Learning Technology 2019.07.19 2025.05.28 Literature Database