Feedback Learning for Improving the Robustness of Neural Networks Authors: Chang Song, Zuoguan Wang, Hai Li | Published: 2019-09-12 Class ImbalanceAttack MethodAdversarial Example 2019.09.12 2025.05.28 Literature Database
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences Authors: Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang | Published: 2019-09-12 Sensor State EstimationAttack MethodMachine Learning Application 2019.09.12 2025.05.28 Literature Database
Structural Robustness for Deep Learning Architectures Authors: Carlos Lassance, Vincent Gripon, Jian Tang, Antonio Ortega | Published: 2019-09-11 Attack MethodMachine Learning ApplicationMachine Learning Method 2019.09.11 2025.05.28 Literature Database
Sparse and Imperceivable Adversarial Attacks Authors: Francesco Croce, Matthias Hein | Published: 2019-09-11 PoisoningAttack MethodMachine Learning Method 2019.09.11 2025.05.28 Literature Database
PDA: Progressive Data Augmentation for General Robustness of Deep Neural Networks Authors: Hang Yu, Aishan Liu, Xianglong Liu, Gengchao Li, Ping Luo, Ran Cheng, Jichen Yang, Chongzhi Zhang | Published: 2019-09-11 | Updated: 2020-02-24 PoisoningModel RobustnessAttack Method 2019.09.11 2025.05.28 Literature Database
Effectiveness of Adversarial Examples and Defenses for Malware Classification Authors: Robert Podschwadt, Hassan Takabi | Published: 2019-09-10 Attack MethodAdversarial ExampleAdaptive Adversarial Training 2019.09.10 2025.05.28 Literature Database
Poisoning Attacks with Generative Adversarial Nets Authors: Luis Muñoz-González, Bjarne Pfitzner, Matteo Russo, Javier Carnerero-Cano, Emil C. Lupu | Published: 2019-06-18 | Updated: 2019-09-25 Backdoor AttackAttack MethodGenerative Adversarial Network 2019.06.18 2025.05.28 Literature Database
On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks Authors: Masoumeh Shafieinejad, Jiaqi Wang, Nils Lukas, Xinda Li, Florian Kerschbaum | Published: 2019-06-18 | Updated: 2019-11-26 DNN IP Protection MethodBackdoor AttackAttack Method 2019.06.18 2025.05.28 Literature Database
Membership Privacy for Machine Learning Models Through Knowledge Transfer Authors: Virat Shejwalkar, Amir Houmansadr | Published: 2019-06-15 | Updated: 2020-12-31 Privacy ProtectionAttack MethodKnowledge Transferability 2019.06.15 2025.05.28 Literature Database
Combatting Adversarial Attacks through Denoising and Dimensionality Reduction: A Cascaded Autoencoder Approach Authors: Rajeev Sahay, Rehana Mahfuz, Aly El Gamal | Published: 2018-12-07 Attack MethodAdversarial Example DetectionDefense Effectiveness Analysis 2018.12.07 2025.05.28 Literature Database