Exploiting Human Social Cognition for the Detection of Fake and Fraudulent Faces via Memory Networks Authors: Tharindu Fernando, Clinton Fookes, Simon Denman, Sridha Sridharan | Published: 2019-11-17 Model Performance EvaluationAttention MechanismImage Forensics 2019.11.17 2025.05.28 Literature Database
Suspicion-Free Adversarial Attacks on Clustering Algorithms Authors: Anshuman Chhabra, Abhishek Roy, Prasant Mohapatra | Published: 2019-11-16 Model Performance EvaluationNumerical Stability IssuesAdversarial Attack Methods 2019.11.16 2025.05.28 Literature Database
DomainGAN: Generating Adversarial Examples to Attack Domain Generation Algorithm Classifiers Authors: Isaac Corley, Jonathan Lwowski, Justin Hoffman | Published: 2019-11-14 | Updated: 2020-02-14 Botnet DetectionModel Performance EvaluationAdversarial Attack Methods 2019.11.14 2025.05.28 Literature Database
There is Limited Correlation between Coverage and Robustness for Deep Neural Networks Authors: Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Dai Ting | Published: 2019-11-14 Model Performance EvaluationAdversarial ExampleAdversarial Attack Methods 2019.11.14 2025.05.28 Literature Database
On Robustness to Adversarial Examples and Polynomial Optimization Authors: Pranjal Awasthi, Abhratanu Dutta, Aravindan Vijayaraghavan | Published: 2019-11-12 Model Performance EvaluationAdversarial Attack MethodsComputational Problem 2019.11.12 2025.05.28 Literature Database
RAD: On-line Anomaly Detection for Highly Unreliable Data Authors: Zilong Zhao, Robert Birke, Rui Han, Bogdan Robu, Sara Bouchenak, Sonia Ben Mokhtar, Lydia Y. Chen | Published: 2019-11-11 Class ImbalanceData LeakageModel Performance Evaluation 2019.11.11 2025.05.28 Literature Database
Patch augmentation: Towards efficient decision boundaries for neural networks Authors: Marcus D. Bloice, Peter M. Roth, Andreas Holzinger | Published: 2019-11-08 | Updated: 2019-11-25 Model Performance EvaluationAdversarial Attack MethodsFeature Engineering 2019.11.08 2025.05.28 Literature Database
White-Box Target Attack for EEG-Based BCI Regression Problems Authors: Lubin Meng, Chin-Teng Lin, Tzyy-Ring Jung, Dongrui Wu | Published: 2019-11-07 Model Performance EvaluationAdversarial Attack MethodsKnowledge Transferability 2019.11.07 2025.05.28 Literature Database
Long-range Event-level Prediction and Response Simulation for Urban Crime and Global Terrorism with Granger Networks Authors: Timmy Li, Yi Huang, James Evans, Ishanu Chattopadhyay | Published: 2019-11-04 Model Performance EvaluationNumerical Stability IssuesRole of Machine Learning 2019.11.04 2025.05.28 Literature Database
Automatic Driver Identification from In-Vehicle Network Logs Authors: Mina Remeli, Szilvia Lestyan, Gergely Acs, Gergely Biczok | Published: 2019-10-25 Privacy ViolationModel Performance EvaluationVehicle Network Security 2019.10.25 2025.05.28 Literature Database