Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain Authors: Yigit Alparslan, Ken Alparslan, Jeremy Keim-Shenk, Shweta Khade, Rachel Greenstadt | Published: 2020-01-30 | Updated: 2021-02-08 Robustness Improvement MethodAdversarial ExampleAdversarial Perturbation Techniques 2020.01.30 2025.05.28 Literature Database
Generating Natural Adversarial Hyperspectral examples with a modified Wasserstein GAN Authors: Jean-Christophe Burnel, Kilian Fatras, Nicolas Courty | Published: 2020-01-27 Data Generation MethodAdversarial ExampleGenerative Adversarial Network 2020.01.27 2025.05.28 Literature Database
On the human evaluation of audio adversarial examples Authors: Jon Vadillo, Roberto Santana | Published: 2020-01-23 | Updated: 2021-02-12 Adversarial ExampleAdversarial Attack DetectionMalfunction of Voice Assistants 2020.01.23 2025.05.28 Literature Database
HRFA: High-Resolution Feature-based Attack Authors: Zhixing Ye, Sizhe Chen, Peidong Zhang, Chengjin Sun, Xiaolin Huang | Published: 2020-01-21 | Updated: 2020-10-22 Adversarial ExampleAdversarial Attack DetectionGenerative Adversarial Network 2020.01.21 2025.05.28 Literature Database
Secure and Robust Machine Learning for Healthcare: A Survey Authors: Adnan Qayyum, Junaid Qadir, Muhammad Bilal, Ala Al-Fuqaha | Published: 2020-01-21 Medical Image AnalysisAdversarial ExampleMachine Learning Method 2020.01.21 2025.05.28 Literature Database
Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks Authors: Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan | Published: 2020-01-16 Adversarial ExampleAdversarial LearningComputational Complexity 2020.01.16 2025.05.28 Literature Database
Advbox: a toolbox to generate adversarial examples that fool neural networks Authors: Dou Goodman, Hao Xin, Wang Yang, Wu Yuesheng, Xiong Junfeng, Zhang Huan | Published: 2020-01-13 | Updated: 2020-08-26 PoisoningAdversarial ExampleAdversarial Attack Methods 2020.01.13 2025.05.28 Literature Database
Fast is better than free: Revisiting adversarial training Authors: Eric Wong, Leslie Rice, J. Zico Kolter | Published: 2020-01-12 Adversarial ExampleAdversarial attackDeep Learning Method 2020.01.12 2025.05.28 Literature Database
Generating Semantic Adversarial Examples via Feature Manipulation Authors: Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen | Published: 2020-01-06 | Updated: 2022-05-20 Data GenerationAdversarial ExampleAdversarial Learning 2020.01.06 2025.05.28 Literature Database
Benchmarking Adversarial Robustness Authors: Yinpeng Dong, Qi-An Fu, Xiao Yang, Tianyu Pang, Hang Su, Zihao Xiao, Jun Zhu | Published: 2019-12-26 PoisoningAdversarial ExampleEffectiveness Analysis of Defense Methods 2019.12.26 2025.05.28 Literature Database