Extending Adversarial Attacks to Produce Adversarial Class Probability Distributions Authors: Jon Vadillo, Roberto Santana, Jose A. Lozano | Published: 2020-04-14 | Updated: 2023-01-25 Robustness EvaluationAdversarial ExampleAdversarial Learning 2020.04.14 2025.05.28 Literature Database
Towards Robust Classification with Image Quality Assessment Authors: Yeli Feng, Yiyu Cai | Published: 2020-04-14 RobustnessAdversarial ExampleDeep Learning 2020.04.14 2025.05.28 Literature Database
Luring of transferable adversarial perturbations in the black-box paradigm Authors: Rémi Bernhard, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2020-04-10 | Updated: 2021-03-03 Robustness Improvement MethodAttack EvaluationAdversarial Example 2020.04.10 2025.05.28 Literature Database
MetaPoison: Practical General-purpose Clean-label Data Poisoning Authors: W. Ronny Huang, Jonas Geiping, Liam Fowl, Gavin Taylor, Tom Goldstein | Published: 2020-04-01 | Updated: 2021-02-21 Backdoor AttackPoisoningAdversarial Example 2020.04.01 2025.05.28 Literature Database
Adversarial Perturbations Fool Deepfake Detectors Authors: Apurva Gandhi, Shomik Jain | Published: 2020-03-24 | Updated: 2020-05-15 Adversarial ExampleAdversarial Attack MethodsDefense Method 2020.03.24 2025.05.28 Literature Database
One Neuron to Fool Them All Authors: Anshuman Suri, David Evans | Published: 2020-03-20 | Updated: 2020-06-09 Training MethodRobustnessAdversarial Example 2020.03.20 2025.05.28 Literature Database
RAB: Provable Robustness Against Backdoor Attacks Authors: Maurice Weber, Xiaojun Xu, Bojan Karlaš, Ce Zhang, Bo Li | Published: 2020-03-19 | Updated: 2023-08-03 Backdoor AttackRobustnessAdversarial Example 2020.03.19 2025.05.28 Literature Database
Adversarial Transferability in Wearable Sensor Systems Authors: Ramesh Kumar Sah, Hassan Ghasemzadeh | Published: 2020-03-17 | Updated: 2021-07-15 Adversarial ExampleAdversarial Attack MethodsNon-Identical Dataset 2020.03.17 2025.05.28 Literature Database
Manifold Regularization for Locally Stable Deep Neural Networks Authors: Charles Jin, Martin Rinard | Published: 2020-03-09 | Updated: 2020-09-22 Training MethodRobustnessAdversarial Example 2020.03.09 2025.05.28 Literature Database
Gradient-based adversarial attacks on categorical sequence models via traversing an embedded world Authors: Ivan Fursov, Alexey Zaytsev, Nikita Kluchnikov, Andrey Kravchenko, Evgeny Burnaev | Published: 2020-03-09 | Updated: 2020-10-12 Adversarial ExampleAdversarial attackGenerative Model 2020.03.09 2025.05.28 Literature Database