Attacking Graph-based Classification via Manipulating the Graph Structure Authors: Binghui Wang, Neil Zhenqiang Gong | Published: 2019-03-01 | Updated: 2019-08-13 PoisoningModel InversionAdversarial Graph Classification 2019.03.01 2025.05.28 Literature Database
TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents Authors: Panagiota Kiourti, Kacper Wardega, Susmit Jha, Wenchao Li | Published: 2019-03-01 PoisoningReinforcement LearningAdversarial Attack Methods 2019.03.01 2025.05.28 Literature Database
Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Willy Susilo, Yukun Bao | Published: 2019-02-23 Performance EvaluationPhishing DetectionPoisoning 2019.02.23 2025.05.28 Literature Database
advertorch v0.1: An Adversarial Robustness Toolbox based on PyTorch Authors: Gavin Weiguang Ding, Luyu Wang, Xiaomeng Jin | Published: 2019-02-20 PoisoningAdversarial LearningResearch Methodology 2019.02.20 2025.05.28 Literature Database
Mitigation of Adversarial Examples in RF Deep Classifiers Utilizing AutoEncoder Pre-training Authors: Silvija Kokalj-Filipovic, Rob Miller, Nicholas Chang, Chi Leung Lau | Published: 2019-02-16 PoisoningAdversarial attackAdversarial Attack Methods 2019.02.16 2025.05.28 Literature Database
Adversarial Attack and Defense on Graph Data: A Survey Authors: Lichao Sun, Yingtong Dou, Carl Yang, Ji Wang, Yixin Liu, Philip S. Yu, Lifang He, Bo Li | Published: 2018-12-26 | Updated: 2022-10-06 PoisoningRobustnessAdversarial Example 2018.12.26 2025.05.28 Literature Database
Analyzing Federated Learning through an Adversarial Lens Authors: Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal, Seraphin Calo | Published: 2018-11-29 | Updated: 2019-11-25 PoisoningFederated LearningWeight Update Method 2018.11.29 2025.05.28 Literature Database
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning Authors: Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh | Published: 2018-11-08 | Updated: 2019-08-26 PoisoningMalicious Content GenerationAdversarial Learning 2018.11.08 2025.05.28 Literature Database
TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-02 | Updated: 2020-05-14 Detection of Poison Data for Backdoor AttacksPoisoningPerformance Evaluation Method 2018.11.02 2025.05.28 Literature Database
Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks Authors: Davide Maiorca, Battista Biggio, Giorgio Giacinto | Published: 2018-11-02 | Updated: 2020-04-14 PoisoningMalware EvolutionCertified Robustness 2018.11.02 2025.05.28 Literature Database