Universal Decision-Based Black-Box Perturbations: Breaking Security-Through-Obscurity Defenses Authors: Thomas A. Hogan, Bhavya Kailkhura | Published: 2018-11-09 | Updated: 2018-11-13 Trigger DetectionMalicious Content GenerationAttack Evaluation 2018.11.09 2025.05.28 Literature Database
SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters Authors: Hassan Ali, Faiq Khalid, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-04 | Updated: 2020-05-15 Trigger DetectionRobustness ImprovementAttack Evaluation 2018.11.04 2025.05.28 Literature Database
RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications Authors: Huan Zhang, Pengchuan Zhang, Cho-Jui Hsieh | Published: 2018-10-28 | Updated: 2019-02-27 Trigger DetectionMathematical AnalysisAdversarial Learning 2018.10.28 2025.05.28 Literature Database
Towards Query Efficient Black-box Attacks: An Input-free Perspective Authors: Yali Du, Meng Fang, Jinfeng Yi, Jun Cheng, Dacheng Tao | Published: 2018-09-09 Query Generation MethodTrigger DetectionPoisoning 2018.09.09 2025.05.28 Literature Database
Adversarial Attack Type I: Cheat Classifiers by Significant Changes Authors: Sanli Tang, Xiaolin Huang, Mingjian Chen, Chengjin Sun, Jie Yang | Published: 2018-09-03 | Updated: 2019-07-22 Trigger DetectionRobustness AnalysisAdversarial Transferability 2018.09.03 2025.05.28 Literature Database
2P-DNN : Privacy-Preserving Deep Neural Networks Based on Homomorphic Cryptosystem Authors: Qiang Zhu, Xixiang Lv | Published: 2018-07-23 Trigger DetectionPrivacy AssessmentModel Design and Accuracy 2018.07.23 2025.05.28 Literature Database
Hardware Trojan Attacks on Neural Networks Authors: Joseph Clements, Yingjie Lao | Published: 2018-06-14 Trigger DetectionAdversarial ExampleDeep Learning Technology 2018.06.14 2025.05.28 Literature Database
PeerNets: Exploiting Peer Wisdom Against Adversarial Attacks Authors: Jan Svoboda, Jonathan Masci, Federico Monti, Michael M. Bronstein, Leonidas Guibas | Published: 2018-05-31 Trigger DetectionAdversarial Example DetectionDeep Learning Method 2018.05.31 2025.05.28 Literature Database
Defending Against Adversarial Attacks by Leveraging an Entire GAN Authors: Gokula Krishnan Santhanam, Paulina Grnarova | Published: 2018-05-27 Trigger DetectionModel RobustnessAdversarial Attack Detection 2018.05.27 2025.05.28 Literature Database
When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time Authors: David J. Miller, Yulia Wang, George Kesidis | Published: 2017-12-18 | Updated: 2018-06-28 Trigger DetectionAdversarial ExampleAdversarial Attack Methods 2017.12.18 2025.05.28 Literature Database