Sequential Attacks on Agents for Long-Term Adversarial Goals Authors: Edgar Tretschk, Seong Joon Oh, Mario Fritz | Published: 2018-05-31 | Updated: 2018-07-05 Certified RobustnessReinforcement LearningAdversarial Transferability 2018.05.31 2025.05.28 Literature Database
Adversarial Noise Attacks of Deep Learning Architectures — Stability Analysis via Sparse Modeled Signals Authors: Yaniv Romano, Aviad Aberdam, Jeremias Sulam, Michael Elad | Published: 2018-05-29 | Updated: 2019-08-05 Sparsity OptimizationCertified RobustnessWatermark Evaluation 2018.05.29 2025.05.28 Literature Database
Detecting Deceptive Reviews using Generative Adversarial Networks Authors: Hojjat Aghakhani, Aravind Machiry, Shirin Nilizadeh, Christopher Kruegel, Giovanni Vigna | Published: 2018-05-25 Backdoor DetectionCertified RobustnessDeception Detection 2018.05.25 2025.05.28 Literature Database
Adversarial Attacks on Neural Networks for Graph Data Authors: Daniel Zügner, Amir Akbarnejad, Stephan Günnemann | Published: 2018-05-21 | Updated: 2021-12-09 PoisoningCertified RobustnessAdversarial Attack Detection 2018.05.21 2025.05.28 Literature Database
Featurized Bidirectional GAN: Adversarial Defense via Adversarially Learned Semantic Inference Authors: Ruying Bao, Sihang Liang, Qingcan Wang | Published: 2018-05-21 | Updated: 2018-09-29 Certified RobustnessAdversarial Attack DetectionWatermark Design 2018.05.21 2025.05.28 Literature Database
Targeted Adversarial Examples for Black Box Audio Systems Authors: Rohan Taori, Amog Kamsetty, Brenton Chu, Nikita Vemuri | Published: 2018-05-20 | Updated: 2019-08-20 Certified RobustnessAdversarial Attack DetectionSpeech Recognition System 2018.05.20 2025.05.28 Literature Database
Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models Authors: Pouya Samangouei, Maya Kabkab, Rama Chellappa | Published: 2018-05-17 | Updated: 2018-05-18 Certified RobustnessInformation SecurityAdversarial Attack Detection 2018.05.17 2025.05.28 Literature Database
Detecting Adversarial Samples for Deep Neural Networks through Mutation Testing Authors: Jingyi Wang, Jun Sun, Peixin Zhang, Xinyu Wang | Published: 2018-05-14 | Updated: 2018-05-17 Certified RobustnessAdversarial ExampleAdversarial Attack Detection 2018.05.14 2025.05.28 Literature Database
How Robust are Deep Neural Networks? Authors: Biswa Sengupta, Karl J. Friston | Published: 2018-04-30 Certified RobustnessDeep Learning-Based IDSWatermarking Technology 2018.04.30 2025.05.28 Literature Database
Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers Authors: Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach | Published: 2018-04-23 | Updated: 2020-10-03 Query Generation MethodCertified RobustnessAdversarial Attack Methods 2018.04.23 2025.05.28 Literature Database