Adversarial Attacks on Deep Learning Systems for User Identification based on Motion Sensors Authors: Cezara Benegui, Radu Tudor Ionescu | Published: 2020-09-02 | Updated: 2020-11-05 Adversarial ExampleAdversarial attackDeep Learning Technology 2020.09.02 2025.05.28 Literature Database
Benchmarking adversarial attacks and defenses for time-series data Authors: Shoaib Ahmed Siddiqui, Andreas Dengel, Sheraz Ahmed | Published: 2020-08-30 Adversarial ExampleAdversarial attackDeep Learning Technology 2020.08.30 2025.05.28 Literature Database
Improving Resistance to Adversarial Deformations by Regularizing Gradients Authors: Pengfei Xia, Bin Li | Published: 2020-08-29 | Updated: 2020-10-06 PoisoningAdversarial ExampleAdversarial attack 2020.08.29 2025.05.28 Literature Database
Adversarially Training for Audio Classifiers Authors: Raymel Alfonso Sallo, Mohammad Esmaeilpour, Patrick Cardinal | Published: 2020-08-26 | Updated: 2020-10-25 Adversarial ExampleAdversarial LearningSpeech Signal Processing 2020.08.26 2025.05.28 Literature Database
NoPeek: Information leakage reduction to share activations in distributed deep learning Authors: Praneeth Vepakomma, Abhishek Singh, Otkrist Gupta, Ramesh Raskar | Published: 2020-08-20 Information Leakage AnalysisAdversarial ExampleDeep Learning 2020.08.20 2025.05.28 Literature Database
Addressing Neural Network Robustness with Mixup and Targeted Labeling Adversarial Training Authors: Alfred Laugros, Alice Caplier, Matthieu Ospici | Published: 2020-08-19 Robustness Improvement MethodAdversarial ExampleVulnerability of Adversarial Examples 2020.08.19 2025.05.28 Literature Database
Improving adversarial robustness of deep neural networks by using semantic information Authors: Lina Wang, Rui Tang, Yawei Yue, Xingshu Chen, Wei Wang, Yi Zhu, Xuemei Zeng | Published: 2020-08-18 | Updated: 2021-06-17 Semantic Information ExtractionRobustnessAdversarial Example 2020.08.18 2025.05.28 Literature Database
A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems Authors: Ali Sayghe, Yaodan Hu, Ioannis Zografopoulos, XiaoRui Liu, Raj Gautam Dutta, Yier Jin, Charalambos Konstantinou | Published: 2020-08-16 Adversarial ExampleMachine Learning TechnologyEvaluation Method 2020.08.16 2025.05.28 Literature Database
TextDecepter: Hard Label Black Box Attack on Text Classifiers Authors: Sachin Saxena | Published: 2020-08-16 | Updated: 2020-12-28 Application of Text ClassificationAdversarial ExampleAdversarial Training 2020.08.16 2025.05.28 Literature Database
Learning to Learn from Mistakes: Robust Optimization for Adversarial Noise Authors: Alex Serban, Erik Poll, Joost Visser | Published: 2020-08-12 Adversarial ExampleAdversarial TrainingOptimization Problem 2020.08.12 2025.05.28 Literature Database