One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy Authors: Jingkang Wang, Ruoxi Jia, Gerald Friedland, Bo Li, Costas Spanos | Published: 2018-10-23 Robust EstimationAdversarial Example DetectionAdversarial Transferability 2018.10.23 2025.05.28 Literature Database
A Training-based Identification Approach to VIN Adversarial Examples Authors: Yingdi Wang, Wenjia Niu, Tong Chen, Yingxiao Xiang, Jingjing Liu, Gang Li, Jiqiang Liu | Published: 2018-10-18 Robustness Improvement MethodAdversarial Example DetectionAdversarial Attack Methods 2018.10.18 2025.05.28 Literature Database
DeepImageSpam: Deep Learning based Image Spam Detection Authors: Amara Dinesh Kumar, Vinayakumar R, Soman KP | Published: 2018-10-03 Spam Classification ModelAdversarial Example DetectionResearch Methodology 2018.10.03 2025.05.28 Literature Database
Structure-Preserving Transformation: Generating Diverse and Transferable Adversarial Examples Authors: Dan Peng, Zizhan Zheng, Xiaofeng Zhang | Published: 2018-09-08 | Updated: 2018-12-22 Certified RobustnessAdversarial Example DetectionAdversarial Transferability 2018.09.08 2025.05.28 Literature Database
Are adversarial examples inevitable? Authors: Ali Shafahi, W. Ronny Huang, Christoph Studer, Soheil Feizi, Tom Goldstein | Published: 2018-09-06 | Updated: 2020-02-03 Robustness AnalysisAdversarial ExampleAdversarial Example Detection 2018.09.06 2025.05.28 Literature Database
HASP: A High-Performance Adaptive Mobile Security Enhancement Against Malicious Speech Recognition Authors: Zirui Xu, Fuxun Yu, Chenchen Liu, Xiang Chen | Published: 2018-09-04 Robustness Improvement MethodPerformance EvaluationAdversarial Example Detection 2018.09.04 2025.05.28 Literature Database
MULDEF: Multi-model-based Defense Against Adversarial Examples for Neural Networks Authors: Siwakorn Srisakaokul, Yuhao Zhang, Zexuan Zhong, Wei Yang, Tao Xie, Bo Li | Published: 2018-08-31 | Updated: 2019-07-27 Model EnsembleAdversarial Example DetectionAdversarial Learning 2018.08.31 2025.05.28 Literature Database
Security and Privacy Issues in Deep Learning Authors: Ho Bae, Jaehee Jang, Dahuin Jung, Hyemi Jang, Heonseok Ha, Hyungyu Lee, Sungroh Yoon | Published: 2018-07-31 | Updated: 2021-03-10 Differential PrivacyAdversarial Example DetectionAdversarial attack 2018.07.31 2025.05.28 Literature Database
A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks Authors: Kimin Lee, Kibok Lee, Honglak Lee, Jinwoo Shin | Published: 2018-07-10 | Updated: 2018-10-27 Model EvaluationAdversarial Example DetectionAdversarial Learning 2018.07.10 2025.05.28 Literature Database
Detection based Defense against Adversarial Examples from the Steganalysis Point of View Authors: Jiayang Liu, Weiming Zhang, Yiwei Zhang, Dongdong Hou, Yujia Liu, Hongyue Zha, Nenghai Yu | Published: 2018-06-21 | Updated: 2018-12-24 CybersecurityAdversarial Example DetectionAdversarial Training 2018.06.21 2025.05.28 Literature Database