Adversarial Attacks and Defenses on Graphs: A Review, A Tool and Empirical Studies Authors: Wei Jin, Yaxin Li, Han Xu, Yiqi Wang, Shuiwang Ji, Charu Aggarwal, Jiliang Tang | Published: 2020-03-02 | Updated: 2020-12-12 PoisoningAdversarial ExampleAdversarial Learning 2020.03.02 2025.05.28 Literature Database
Gödel’s Sentence Is An Adversarial Example But Unsolvable Authors: Xiaodong Qi, Lansheng Han | Published: 2020-02-25 Adversarial ExampleAdversarial TrainingVulnerability Prediction 2020.02.25 2025.05.28 Literature Database
Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah | Published: 2020-02-22 | Updated: 2020-02-27 Performance EvaluationAdversarial ExampleAdversarial Training 2020.02.22 2025.05.28 Literature Database
Adversarial Attacks on Machine Learning Systems for High-Frequency Trading Authors: Micah Goldblum, Avi Schwarzschild, Ankit B. Patel, Tom Goldstein | Published: 2020-02-21 | Updated: 2021-10-29 Transaction Generation MethodAdversarial ExampleVulnerability Prediction 2020.02.21 2025.05.28 Literature Database
A Bayes-Optimal View on Adversarial Examples Authors: Eitan Richardson, Yair Weiss | Published: 2020-02-20 | Updated: 2021-03-17 Robustness EvaluationAdversarial ExampleAdversarial Training 2020.02.20 2025.05.28 Literature Database
On the Decision Boundaries of Neural Networks: A Tropical Geometry Perspective Authors: Motasem Alfarra, Adel Bibi, Hasan Hammoud, Mohamed Gaafar, Bernard Ghanem | Published: 2020-02-20 | Updated: 2022-08-22 Robustness EvaluationAdversarial ExampleOptimization Problem 2020.02.20 2025.05.28 Literature Database
Towards Certifiable Adversarial Sample Detection Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2020-02-20 Adversarial ExampleRegularizationDefense Method 2020.02.20 2025.05.28 Literature Database
On Adaptive Attacks to Adversarial Example Defenses Authors: Florian Tramer, Nicholas Carlini, Wieland Brendel, Aleksander Madry | Published: 2020-02-19 | Updated: 2020-10-23 Robustness EvaluationAdversarial ExampleDefense Method 2020.02.19 2025.05.28 Literature Database
Indirect Adversarial Attacks via Poisoning Neighbors for Graph Convolutional Networks Authors: Tsubasa Takahashi | Published: 2020-02-19 Graph Neural NetworkAdversarial ExampleAdversarial Attack Detection 2020.02.19 2025.05.28 Literature Database
On the Matrix-Free Generation of Adversarial Perturbations for Black-Box Attacks Authors: Hisaichi Shibata, Shouhei Hanaoka, Yukihiro Nomura, Naoto Hayashi, Osamu Abe | Published: 2020-02-18 Adversarial ExampleAdversarial Attack DetectionComputational Efficiency 2020.02.18 2025.05.28 Literature Database