On Norm-Agnostic Robustness of Adversarial Training Authors: Bai Li, Changyou Chen, Wenlin Wang, Lawrence Carin | Published: 2019-05-15 PoisoningAdversarial ExampleAdversarial Training 2019.05.15 2025.05.28 Literature Database
Transferable Clean-Label Poisoning Attacks on Deep Neural Nets Authors: Chen Zhu, W. Ronny Huang, Ali Shafahi, Hengduo Li, Gavin Taylor, Christoph Studer, Tom Goldstein | Published: 2019-05-15 | Updated: 2019-05-16 Backdoor AttackPoisoningAttack Type 2019.05.15 2025.05.28 Literature Database
Adversarial Defense Framework for Graph Neural Network Authors: Shen Wang, Zhengzhang Chen, Jingchao Ni, Xiao Yu, Zhichun Li, Haifeng Chen, Philip S. Yu | Published: 2019-05-09 | Updated: 2019-05-10 FrameworkPoisoningRobust Estimation 2019.05.09 2025.05.28 Literature Database
Cognitive Triaging of Phishing Attacks Authors: Amber van der Heijden, Luca Allodi | Published: 2019-05-06 | Updated: 2019-05-29 Data Collection MethodPoisoningAttack Scenario Analysis 2019.05.06 2025.05.28 Literature Database
Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples Authors: Vikash Sehwag, Arjun Nitin Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, Prateek Mittal | Published: 2019-05-05 PoisoningAdversarial ExampleAdversarial Attack Detection 2019.05.05 2025.05.28 Literature Database
Mimic Learning to Generate a Shareable Network Intrusion Detection Model Authors: Ahmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud | Published: 2019-05-02 | Updated: 2020-02-18 PoisoningModel DesignMachine Learning 2019.05.02 2025.05.28 Literature Database
Adversarial Training for Free! Authors: Ali Shafahi, Mahyar Najibi, Amin Ghiasi, Zheng Xu, John Dickerson, Christoph Studer, Larry S. Davis, Gavin Taylor, Tom Goldstein | Published: 2019-04-29 | Updated: 2019-11-20 PoisoningAdversarial ExampleAdaptive Adversarial Training 2019.04.29 2025.05.28 Literature Database
Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks Authors: David J. Miller, Zhen Xiang, George Kesidis | Published: 2019-04-12 | Updated: 2019-12-02 Backdoor AttackPoisoningAdversarial Attack Detection 2019.04.12 2025.05.28 Literature Database
Online Data Poisoning Attack Authors: Xuezhou Zhang, Xiaojin Zhu, Laurent Lessard | Published: 2019-03-05 | Updated: 2019-05-30 PoisoningReinforcement Learning AttackOptimization Problem 2019.03.05 2025.05.28 Literature Database
PuVAE: A Variational Autoencoder to Purify Adversarial Examples Authors: Uiwon Hwang, Jaewoo Park, Hyemi Jang, Sungroh Yoon, Nam Ik Cho | Published: 2019-03-02 PoisoningRobustness Improvement MethodAdversarial Perturbation Techniques 2019.03.02 2025.05.28 Literature Database