Sitatapatra: Blocking the Transfer of Adversarial Samples Authors: Ilia Shumailov, Xitong Gao, Yiren Zhao, Robert Mullins, Ross Anderson, Cheng-Zhong Xu | Published: 2019-01-23 | Updated: 2019-11-21 Certified RobustnessAdversarial ExampleNon-Transferable Detection 2019.01.23 2025.05.28 Literature Database
Universal Rules for Fooling Deep Neural Networks based Text Classification Authors: Di Li, Danilo Vasconcellos Vargas, Sakurai Kouichi | Published: 2019-01-22 | Updated: 2019-04-03 Trigger DetectionAdversarial ExampleDeep Learning Method 2019.01.22 2025.05.28 Literature Database
Adversarial Attack and Defense on Graph Data: A Survey Authors: Lichao Sun, Yingtong Dou, Carl Yang, Ji Wang, Yixin Liu, Philip S. Yu, Lifang He, Bo Li | Published: 2018-12-26 | Updated: 2022-10-06 PoisoningRobustnessAdversarial Example 2018.12.26 2025.05.28 Literature Database
Deep-RBF Networks Revisited: Robust Classification with Rejection Authors: Pourya Habib Zadeh, Reshad Hosseini, Suvrit Sra | Published: 2018-12-07 Certified RobustnessExperimental ValidationAdversarial Example 2018.12.07 2025.05.28 Literature Database
Adversarial Attacks, Regression, and Numerical Stability Regularization Authors: Andre T. Nguyen, Edward Raff | Published: 2018-12-07 Robust RegressionAdversarial ExampleDefense Effectiveness Analysis 2018.12.07 2025.05.28 Literature Database
The Limitations of Model Uncertainty in Adversarial Settings Authors: Kathrin Grosse, David Pfaff, Michael Thomas Smith, Michael Backes | Published: 2018-12-06 | Updated: 2019-11-17 Certified RobustnessRobustness EvaluationAdversarial Example 2018.12.06 2025.05.28 Literature Database
On Configurable Defense against Adversarial Example Attacks Authors: Bo Luo, Min Li, Yu Li, Qiang Xu | Published: 2018-12-06 Adversarial ExampleAdversarial LearningDefense Method 2018.12.06 2025.05.28 Literature Database
Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples Authors: Huangyi Ge, Sze Yiu Chau, Bruno Ribeiro, Ninghui Li | Published: 2018-12-05 | Updated: 2020-01-20 Certified RobustnessAdversarial ExampleDefense Method 2018.12.05 2025.05.28 Literature Database
Discrete Adversarial Attacks and Submodular Optimization with Applications to Text Classification Authors: Qi Lei, Lingfei Wu, Pin-Yu Chen, Alexandros G. Dimakis, Inderjit S. Dhillon, Michael Witbrock | Published: 2018-12-01 | Updated: 2019-04-04 Application of Text ClassificationAdversarial ExampleOptimization Problem 2018.12.01 2025.05.28 Literature Database
An Adversarial Approach for Explainable AI in Intrusion Detection Systems Authors: Daniel L. Marino, Chathurika S. Wickramasinghe, Milos Manic | Published: 2018-11-28 Identification of AI OutputModel Performance EvaluationAdversarial Example 2018.11.28 2025.05.28 Literature Database