Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes Authors: Keane Lucas, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, Saurabh Shintre | Published: 2019-12-19 | Updated: 2021-10-25 Binary DiversificationAdversarial ExampleDeep Learning Technology 2019.12.19 2025.05.28 Literature Database
Stealing Knowledge from Protected Deep Neural Networks Using Composite Unlabeled Data Authors: Itay Mosafi, Eli David, Nathan S. Netanyahu | Published: 2019-12-09 DNN IP Protection MethodAdversarial ExampleDeep Learning Method 2019.12.09 2025.05.28 Literature Database
Hardening Random Forest Cyber Detectors Against Adversarial Attacks Authors: Giovanni Apruzzese, Mauro Andreolini, Michele Colajanni, Mirco Marchetti | Published: 2019-12-09 Data GenerationRobustnessAdversarial Example 2019.12.09 2025.05.28 Literature Database
Principal Component Properties of Adversarial Samples Authors: Malhar Jere, Sandro Herbig, Christine Lind, Farinaz Koushanfar | Published: 2019-12-07 RobustnessAdversarial ExampleAdversarial Spectrum Attack Detection 2019.12.07 2025.05.28 Literature Database
Label-Consistent Backdoor Attacks Authors: Alexander Turner, Dimitris Tsipras, Aleksander Madry | Published: 2019-12-05 | Updated: 2019-12-06 Backdoor AttackPoisoningAdversarial Example 2019.12.05 2025.05.28 Literature Database
A Method for Computing Class-wise Universal Adversarial Perturbations Authors: Tejus Gupta, Abhishek Sinha, Nupur Kumari, Mayank Singh, Balaji Krishnamurthy | Published: 2019-12-01 Adversarial ExampleVulnerability of Adversarial ExamplesDeep Learning 2019.12.01 2025.05.28 Literature Database
Computer Systems Have 99 Problems, Let’s Not Make Machine Learning Another One Authors: David Mohaisen, Songqing Chen | Published: 2019-11-28 Model EvaluationAdversarial ExampleMachine Learning Algorithm 2019.11.28 2025.05.28 Literature Database
An Adaptive View of Adversarial Robustness from Test-time Smoothing Defense Authors: Chao Tang, Yifei Fan, Anthony Yezzi | Published: 2019-11-26 PoisoningAdversarial ExampleResearch Methodology 2019.11.26 2025.05.28 Literature Database
Playing it Safe: Adversarial Robustness with an Abstain Option Authors: Cassidy Laidlaw, Soheil Feizi | Published: 2019-11-25 Adversarial LearningAdversarial ExampleAdversarial Attack Methods 2019.11.25 2025.05.28 Literature Database
One Man’s Trash is Another Man’s Treasure: Resisting Adversarial Examples by Adversarial Examples Authors: Chang Xiao, Changxi Zheng | Published: 2019-11-25 | Updated: 2019-11-27 Adversarial ExampleAdversarial Attack MethodsEffectiveness Analysis of Defense Methods 2019.11.25 2025.05.28 Literature Database