A Survey of Black-Box Adversarial Attacks on Computer Vision Models Authors: Siddhant Bhambri, Sumanyu Muku, Avinash Tulasi, Arun Balaji Buduru | Published: 2019-12-03 | Updated: 2020-02-07 PoisoningVulnerability of Adversarial ExamplesEffectiveness Analysis of Defense Methods 2019.12.03 2025.05.28 Literature Database
A Method for Computing Class-wise Universal Adversarial Perturbations Authors: Tejus Gupta, Abhishek Sinha, Nupur Kumari, Mayank Singh, Balaji Krishnamurthy | Published: 2019-12-01 Adversarial ExampleVulnerability of Adversarial ExamplesDeep Learning 2019.12.01 2025.05.28 Literature Database
Achieving Verified Robustness to Symbol Substitutions via Interval Bound Propagation Authors: Po-Sen Huang, Robert Stanforth, Johannes Welbl, Chris Dyer, Dani Yogatama, Sven Gowal, Krishnamurthy Dvijotham, Pushmeet Kohli | Published: 2019-09-03 | Updated: 2019-12-20 Improvement of LearningAdversarial ExampleVulnerability of Adversarial Examples 2019.09.03 2025.05.28 Literature Database
Metric Learning for Adversarial Robustness Authors: Chengzhi Mao, Ziyuan Zhong, Junfeng Yang, Carl Vondrick, Baishakhi Ray | Published: 2019-09-03 | Updated: 2019-10-28 PoisoningImprovement of LearningVulnerability of Adversarial Examples 2019.09.03 2025.05.28 Literature Database
Minimally distorted Adversarial Examples with a Fast Adaptive Boundary Attack Authors: Francesco Croce, Matthias Hein | Published: 2019-07-03 | Updated: 2020-07-20 PoisoningVulnerability of Adversarial ExamplesAdversarial attack 2019.07.03 2025.05.28 Literature Database
Identifying Classes Susceptible to Adversarial Attacks Authors: Rangeet Pan, Md Johirul Islam, Shibbir Ahmed, Hridesh Rajan | Published: 2019-05-30 Vulnerability of Adversarial ExamplesAdversarial Attack MethodsDeep Learning 2019.05.30 2025.05.28 Literature Database
Bandlimiting Neural Networks Against Adversarial Attacks Authors: Yuping Lin, Kasra Ahmadi K. A., Hui Jiang | Published: 2019-05-30 PoisoningVulnerability of Adversarial ExamplesDeep Learning 2019.05.30 2025.05.28 Literature Database
Generalizable Adversarial Attacks with Latent Variable Perturbation Modelling Authors: Avishek Joey Bose, Andre Cianflone, William L. Hamilton | Published: 2019-05-26 | Updated: 2020-01-20 Impact of GeneralizationAdversarial ExampleVulnerability of Adversarial Examples 2019.05.26 2025.05.28 Literature Database
Purifying Adversarial Perturbation with Adversarially Trained Auto-encoders Authors: Hebi Li, Qi Xiao, Shixin Tian, Jin Tian | Published: 2019-05-26 Attack TypeVulnerability of Adversarial ExamplesMachine Learning Method 2019.05.26 2025.05.28 Literature Database
Adversarial Distillation for Ordered Top-k Attacks Authors: Zekun Zhang, Tianfu Wu | Published: 2019-05-25 Adversarial ExampleVulnerability of Adversarial ExamplesMachine Learning Method 2019.05.25 2025.05.28 Literature Database