Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls Authors: Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, Jason H. Li | Published: 2018-11-05 Online LearningMembership InferenceAdversarial Example 2018.11.05 2025.05.28 Literature Database
Excessive Invariance Causes Adversarial Vulnerability Authors: Jörn-Henrik Jacobsen, Jens Behrmann, Richard Zemel, Matthias Bethge | Published: 2018-11-01 | Updated: 2020-07-12 Model InversionAdversarial ExampleAdversarial Training 2018.11.01 2025.05.28 Literature Database
Robust Audio Adversarial Example for a Physical Attack Authors: Hiromu Yakura, Jun Sakuma | Published: 2018-10-28 | Updated: 2019-08-19 Backdoor AttackSignal Processing TechniquesAdversarial Example 2018.10.28 2025.05.28 Literature Database
Exploring Adversarial Examples in Malware Detection Authors: Octavian Suciu, Scott E. Coull, Jeffrey Johns | Published: 2018-10-18 | Updated: 2019-04-13 PoisoningAdversarial ExampleAdversarial Attack Methods 2018.10.18 2025.05.28 Literature Database
Adversarial Examples – A Complete Characterisation of the Phenomenon Authors: Alexandru Constantin Serban, Erik Poll, Joost Visser | Published: 2018-10-02 | Updated: 2019-02-17 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2018.10.02 2025.05.28 Literature Database
Adversarial Attacks and Defences: A Survey Authors: Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, Debdeep Mukhopadhyay | Published: 2018-09-28 Model InversionAdversarial ExampleAdversarial Attack Methods 2018.09.28 2025.05.28 Literature Database
Adversarial Recommendation: Attack of the Learned Fake Users Authors: Konstantina Christakopoulou, Arindam Banerjee | Published: 2018-09-21 Adversarial ExampleAdversarial Attack MethodsGenerative Model 2018.09.21 2025.05.28 Literature Database
HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples Authors: Deqiang Li, Ramesh Baral, Tao Li, Han Wang, Qianmu Li, Shouhuai Xu | Published: 2018-09-18 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2018.09.18 2025.05.28 Literature Database
Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks Authors: Siyue Wang, Xiao Wang, Pu Zhao, Wujie Wen, David Kaeli, Peter Chin, Xue Lin | Published: 2018-09-13 Certified RobustnessRobustness ImprovementAdversarial Example 2018.09.13 2025.05.28 Literature Database
Adversarial Examples: Opportunities and Challenges Authors: Jiliang Zhang, Chen Li | Published: 2018-09-13 | Updated: 2019-09-23 Certified RobustnessAdversarial ExampleDefense Method 2018.09.13 2025.05.28 Literature Database