Failure Modes in Machine Learning Systems Authors: Ram Shankar Siva Kumar, David O Brien, Kendra Albert, Salomé Viljöen, Jeffrey Snover | Published: 2019-11-25 Backdoor AttackPrivacy ViolationAdversarial Example 2019.11.25 2025.05.28 Literature Database
Universal adversarial examples in speech command classification Authors: Jon Vadillo, Roberto Santana | Published: 2019-11-22 | Updated: 2021-02-13 Adversarial ExampleAdversarial Attack MethodsResearch Methodology 2019.11.22 2025.05.28 Literature Database
Attack Agnostic Statistical Method for Adversarial Detection Authors: Sambuddha Saha, Aashish Kumar, Pratyush Sahay, George Jose, Srinivas Kruthiventi, Harikrishna Muralidhara | Published: 2019-11-22 Adversarial ExampleAdversarial attackResearch Methodology 2019.11.22 2025.05.28 Literature Database
Deep Minimax Probability Machine Authors: Lirong He, Ziyi Guo, Kaizhu Huang, Zenglin Xu | Published: 2019-11-20 Model Performance EvaluationAdversarial ExampleAdversarial Attack Methods 2019.11.20 2025.05.28 Literature Database
Generate (non-software) Bugs to Fool Classifiers Authors: Hiromu Yakura, Youhei Akimoto, Jun Sakuma | Published: 2019-11-20 Model Performance EvaluationAdversarial ExampleAdversarial Attack Methods 2019.11.20 2025.05.28 Literature Database
Deep Detector Health Management under Adversarial Campaigns Authors: Javier Echauz, Keith Kenemer, Sarfaraz Hussein, Jay Dhaliwal, Saurabh Shintre, Slawomir Grzonkowski, Andrew Gardner | Published: 2019-11-19 Class ImbalanceAdversarial ExampleAdversarial Attack Methods 2019.11.19 2025.05.28 Literature Database
Attack on Grid Event Cause Analysis: An Adversarial Machine Learning Approach Authors: Iman Niazazari, Hanif Livani | Published: 2019-11-19 | Updated: 2019-11-25 Adversarial ExampleAdversarial Attack MethodsEffectiveness Analysis of Defense Methods 2019.11.19 2025.05.28 Literature Database
Black-Box Adversarial Attack with Transferable Model-based Embedding Authors: Zhichao Huang, Tong Zhang | Published: 2019-11-17 | Updated: 2020-01-05 Adversarial ExampleAdversarial Attack MethodsKnowledge Transferability 2019.11.17 2025.05.28 Literature Database
Defending Against Model Stealing Attacks with Adaptive Misinformation Authors: Sanjay Kariyappa, Moinuddin K Qureshi | Published: 2019-11-16 Adversarial ExampleAdversarial Attack MethodsEffectiveness Analysis of Defense Methods 2019.11.16 2025.05.28 Literature Database
There is Limited Correlation between Coverage and Robustness for Deep Neural Networks Authors: Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Dai Ting | Published: 2019-11-14 Model Performance EvaluationAdversarial ExampleAdversarial Attack Methods 2019.11.14 2025.05.28 Literature Database