Attacking Vision-based Perception in End-to-End Autonomous Driving Models Authors: Adith Boloor, Karthik Garimella, Xin He, Christopher Gill, Yevgeniy Vorobeychik, Xuan Zhang | Published: 2019-10-02 Attack EvaluationAdversarial Attack MethodsVehicle Hijacking Attack 2019.10.02 2025.05.28 Literature Database
Machine-Learning Techniques for Detecting Attacks in SDN Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut | Published: 2019-10-02 Cyber ThreatAttack EvaluationMachine Learning Algorithm 2019.10.02 2025.05.28 Literature Database
Analyzing and Improving Neural Networks by Generating Semantic Counterexamples through Differentiable Rendering Authors: Lakshya Jain, Varun Chandrasekaran, Uyeong Jang, Wilson Wu, Andrew Lee, Andy Yan, Steven Chen, Somesh Jha, Sanjit A. Seshia | Published: 2019-10-02 | Updated: 2020-07-17 Semantic Information ExtractionAttack EvaluationAdversarial Attack Methods 2019.10.02 2025.05.28 Literature Database
Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network Authors: Shisrut Rawat, Aishwarya Srinivasan, Vinayakumar R | Published: 2019-10-01 Model Design and AccuracyAttack EvaluationMachine Learning Algorithm 2019.10.01 2025.05.28 Literature Database
Cross-Layer Strategic Ensemble Defense Against Adversarial Examples Authors: Wenqi Wei, Ling Liu, Margaret Loper, Ka-Ho Chow, Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2019-10-01 PoisoningAttack EvaluationAdversarial Example 2019.10.01 2025.05.28 Literature Database
Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks Authors: Jiadong Lin, Chuanbiao Song, Kun He, Liwei Wang, John E. Hopcroft | Published: 2019-08-17 | Updated: 2020-02-03 Robustness Improvement MethodAttack EvaluationAdversarial Attack Methods 2019.08.17 2025.05.28 Literature Database
Adversarial shape perturbations on 3D point clouds Authors: Daniel Liu, Ronald Yu, Hao Su | Published: 2019-08-16 | Updated: 2020-10-23 Robustness Improvement MethodAttack EvaluationAdversarial Attack Methods 2019.08.16 2025.05.28 Literature Database
BlurNet: Defense by Filtering the Feature Maps Authors: Ravi Raju, Mikko Lipasti | Published: 2019-08-06 | Updated: 2020-05-16 Robustness Improvement MethodAttack EvaluationAdversarial Attack Methods 2019.08.06 2025.05.28 Literature Database
Model Agnostic Defence against Backdoor Attacks in Machine Learning Authors: Sakshi Udeshi, Shanshan Peng, Gerald Woo, Lionell Loh, Louth Rawshan, Sudipta Chattopadhyay | Published: 2019-08-06 | Updated: 2022-03-31 Backdoor AttackAttack EvaluationContent Specialized for Toxicity Attacks 2019.08.06 2025.05.28 Literature Database
A principled approach for generating adversarial images under non-smooth dissimilarity metrics Authors: Aram-Alexandre Pooladian, Chris Finlay, Tim Hoheisel, Adam Oberman | Published: 2019-08-05 | Updated: 2019-10-08 Robustness Improvement MethodAttack EvaluationAdversarial Attack Methods 2019.08.05 2025.05.28 Literature Database