Towards Query Efficient Black-box Attacks: An Input-free Perspective Authors: Yali Du, Meng Fang, Jinfeng Yi, Jun Cheng, Dacheng Tao | Published: 2018-09-09 Query Generation MethodTrigger DetectionPoisoning 2018.09.09 2025.05.28 Literature Database
Adversarial Attack Type I: Cheat Classifiers by Significant Changes Authors: Sanli Tang, Xiaolin Huang, Mingjian Chen, Chengjin Sun, Jie Yang | Published: 2018-09-03 | Updated: 2019-07-22 Trigger DetectionRobustness AnalysisAdversarial Transferability 2018.09.03 2025.05.28 Literature Database
2P-DNN : Privacy-Preserving Deep Neural Networks Based on Homomorphic Cryptosystem Authors: Qiang Zhu, Xixiang Lv | Published: 2018-07-23 Trigger DetectionPrivacy AssessmentModel Design and Accuracy 2018.07.23 2025.05.28 Literature Database
Hardware Trojan Attacks on Neural Networks Authors: Joseph Clements, Yingjie Lao | Published: 2018-06-14 Trigger DetectionAdversarial ExampleDeep Learning Technology 2018.06.14 2025.05.28 Literature Database
PeerNets: Exploiting Peer Wisdom Against Adversarial Attacks Authors: Jan Svoboda, Jonathan Masci, Federico Monti, Michael M. Bronstein, Leonidas Guibas | Published: 2018-05-31 Trigger DetectionAdversarial Example DetectionDeep Learning Method 2018.05.31 2025.05.28 Literature Database
Defending Against Adversarial Attacks by Leveraging an Entire GAN Authors: Gokula Krishnan Santhanam, Paulina Grnarova | Published: 2018-05-27 Trigger DetectionModel RobustnessAdversarial Attack Detection 2018.05.27 2025.05.28 Literature Database
When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time Authors: David J. Miller, Yulia Wang, George Kesidis | Published: 2017-12-18 | Updated: 2018-06-28 Trigger DetectionAdversarial ExampleAdversarial Attack Methods 2017.12.18 2025.05.28 Literature Database
Computer activity learning from system call time series Authors: Curt Hastings, Ronnie Mainieri | Published: 2017-11-06 Clustering methodsTrigger DetectionMalware Detection Method 2017.11.06 2025.05.28 Literature Database
Comment on “Biologically inspired protection of deep networks from adversarial attacks” Authors: Wieland Brendel, Matthias Bethge | Published: 2017-04-05 Trigger DetectionCertified RobustnessAdversarial Learning 2017.04.05 2025.05.28 Literature Database
Generative Poisoning Attack Method Against Neural Networks Authors: Chaofei Yang, Qing Wu, Hai Li, Yiran Chen | Published: 2017-03-03 Trigger DetectionPoisoningGenerative Model 2017.03.03 2025.05.28 Literature Database