Attacking Bayes: On the Adversarial Robustness of Bayesian Neural Networks Authors: Yunzhen Feng, Tim G. J. Rudner, Nikolaos Tsilivis, Julia Kempe | Published: 2024-04-27 Quantification of UncertaintyAdversarial ExampleWatermark Evaluation 2024.04.27 2025.05.27 Literature Database
Evaluations of Machine Learning Privacy Defenses are Misleading Authors: Michael Aerni, Jie Zhang, Florian Tramèr | Published: 2024-04-26 | Updated: 2024-09-05 Privacy Protection MethodMembership InferenceAdversarial Example 2024.04.26 2025.05.27 Literature Database
Black-box Adversarial Transferability: An Empirical Study in Cybersecurity Perspective Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2024-04-15 DDoS Attack DetectionAttack MethodAdversarial Example 2024.04.15 2025.05.27 Literature Database
Adversarial Robustness of Distilled and Pruned Deep Learning-based Wireless Classifiers Authors: Nayan Moni Baishya, B. R. Manoj | Published: 2024-04-11 Edge ComputingAdversarial ExampleAdversarial Training 2024.04.11 2025.05.27 Literature Database
BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial Attack Authors: Viet Quoc Vo, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2024-04-08 | Updated: 2024-06-01 WatermarkingAttack MethodAdversarial Example 2024.04.08 2025.05.27 Literature Database
Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism Authors: Trilokesh Ranjan Sarkar, Nilanjan Das, Pralay Sankar Maitra, Bijoy Some, Ritwik Saha, Orijita Adhikary, Bishal Bose, Jaydip Sen | Published: 2024-04-05 WatermarkingModel Performance EvaluationAdversarial Example 2024.04.05 2025.05.27 Literature Database
Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process Authors: Vitaliy Pozdnyakov, Aleksandr Kovalenko, Ilya Makarov, Mikhail Drobyshevskiy, Kirill Lukyanov | Published: 2024-03-20 | Updated: 2024-06-07 Attack MethodAdversarial ExampleDefense Method 2024.03.20 2025.05.27 Literature Database
SSCAE — Semantic, Syntactic, and Context-aware natural language Adversarial Examples generator Authors: Javad Rafiei Asl, Mohammad H. Rafiei, Manar Alohaly, Daniel Takabi | Published: 2024-03-18 Dynamic Threshold CalculationAdversarial ExampleEvaluation Method 2024.03.18 2025.05.27 Literature Database
Effect of Ambient-Intrinsic Dimension Gap on Adversarial Vulnerability Authors: Rajdeep Haldar, Yue Xing, Qifan Song | Published: 2024-03-06 | Updated: 2024-03-23 Clustering methodsAdversarial ExampleAdversarial Training 2024.03.06 2025.05.27 Literature Database
Robustness bounds on the successful adversarial examples in probabilistic models: Implications from Gaussian processes Authors: Hiroaki Maeshima, Akira Otsuka | Published: 2024-03-04 | Updated: 2025-03-19 Attack MethodAdversarial ExampleWatermark Evaluation 2024.03.04 2025.05.27 Literature Database