Purifying Adversarial Perturbation with Adversarially Trained Auto-encoders Authors: Hebi Li, Qi Xiao, Shixin Tian, Jin Tian | Published: 2019-05-26 Attack TypeVulnerability of Adversarial ExamplesMachine Learning Method 2019.05.26 2025.05.28 Literature Database
Devil in the Detail: Attack Scenarios in Industrial Applications Authors: Simon D. Duque Anton, Alexander Hafner, Hans Dieter Schotten | Published: 2019-05-24 CybersecurityProcess EnvironmentAttack Type 2019.05.24 2025.05.28 Literature Database
Transferable Clean-Label Poisoning Attacks on Deep Neural Nets Authors: Chen Zhu, W. Ronny Huang, Ali Shafahi, Hengduo Li, Gavin Taylor, Christoph Studer, Tom Goldstein | Published: 2019-05-15 | Updated: 2019-05-16 Backdoor AttackPoisoningAttack Type 2019.05.15 2025.05.28 Literature Database
Robustification of deep net classifiers by key based diversified aggregation with pre-filtering Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-05-14 Secure AggregationPerformance EvaluationAttack Type 2019.05.14 2025.05.28 Literature Database
Adversarial-Playground: A Visualization Suite for Adversarial Sample Generation Authors: Andrew Norton, Yanjun Qi | Published: 2017-06-06 | Updated: 2017-06-16 Certified RobustnessAttack TypeAdversarial Learning 2017.06.06 2025.05.28 Literature Database
MagNet: a Two-Pronged Defense against Adversarial Examples Authors: Dongyu Meng, Hao Chen | Published: 2017-05-25 | Updated: 2017-09-11 Attack TypeAdversarial Example DetectionEffectiveness Analysis of Defense Methods 2017.05.25 2025.05.28 Literature Database
Black-Box Attacks against RNN based Malware Detection Algorithms Authors: Weiwei Hu, Ying Tan | Published: 2017-05-23 Certified RobustnessAttack TypeAdversarial Learning 2017.05.23 2025.05.28 Literature Database