Luring of transferable adversarial perturbations in the black-box paradigm Authors: Rémi Bernhard, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2020-04-10 | Updated: 2021-03-03 Robustness Improvement MethodAttack EvaluationAdversarial Example 2020.04.10 2025.05.28 Literature Database
TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems Authors: Ka-Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu | Published: 2020-04-09 Attack EvaluationVulnerability Assessment MethodDefense Method 2020.04.09 2025.05.28 Literature Database
Feature Partitioning for Robust Tree Ensembles and their Certification in Adversarial Scenarios Authors: Stefano Calzavara, Claudio Lucchese, Federico Marcuzzi, Salvatore Orlando | Published: 2020-04-07 Robustness EvaluationAttack EvaluationMaximum Coverage Problem 2020.04.07 2025.05.28 Literature Database
An Overview of Federated Deep Learning Privacy Attacks and Defensive Strategies Authors: David Enthoven, Zaid Al-Ars | Published: 2020-04-01 PoisoningAttack EvaluationDefense Method 2020.04.01 2025.05.28 Literature Database
Confidence-Calibrated Adversarial Training: Generalizing to Unseen Attacks Authors: David Stutz, Matthias Hein, Bernt Schiele | Published: 2019-10-14 | Updated: 2020-06-30 PoisoningAttack EvaluationAdversarial Attack Methods 2019.10.14 2025.05.28 Literature Database
Eavesdrop the Composition Proportion of Training Labels in Federated Learning Authors: Lixu Wang, Shichao Xu, Xiao Wang, Qi Zhu | Published: 2019-10-14 | Updated: 2019-10-27 Backdoor AttackPoisoningAttack Evaluation 2019.10.14 2025.05.28 Literature Database
Policy Poisoning in Batch Reinforcement Learning and Control Authors: Yuzhe Ma, Xuezhou Zhang, Wen Sun, Xiaojin Zhu | Published: 2019-10-13 | Updated: 2019-10-31 Reinforcement Learning EnvironmentAttack EvaluationAttackers and Malicious Devices 2019.10.13 2025.05.28 Literature Database
On Robustness of Neural Ordinary Differential Equations Authors: Hanshu Yan, Jiawei Du, Vincent Y. F. Tan, Jiashi Feng | Published: 2019-10-12 | Updated: 2022-03-03 Model Design and AccuracyAttack EvaluationEffectiveness Analysis of Defense Methods 2019.10.12 2025.05.28 Literature Database
Extraction of Complex DNN Models: Real Threat or Boogeyman? Authors: Buse Gul Atli, Sebastian Szyller, Mika Juuti, Samuel Marchal, N. Asokan | Published: 2019-10-11 | Updated: 2020-05-27 Out-of-Distribution DetectionModel Design and AccuracyAttack Evaluation 2019.10.11 2025.05.28 Literature Database
Hear “No Evil”, See “Kenansville”: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems Authors: Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor | Published: 2019-10-11 Attack EvaluationAdversarial Attack MethodsSpeech Recognition Technology 2019.10.11 2025.05.28 Literature Database