Adversarial Attacks and Defenses on Graphs: A Review, A Tool and Empirical Studies Authors: Wei Jin, Yaxin Li, Han Xu, Yiqi Wang, Shuiwang Ji, Charu Aggarwal, Jiliang Tang | Published: 2020-03-02 | Updated: 2020-12-12 PoisoningAdversarial ExampleAdversarial Learning 2020.03.02 2025.05.28 Literature Database
Adversarial Perturbations Prevail in the Y-Channel of the YCbCr Color Space Authors: Camilo Pestana, Naveed Akhtar, Wei Liu, David Glance, Ajmal Mian | Published: 2020-02-25 Robustness EvaluationAdversarial LearningDefense Method 2020.02.25 2025.05.28 Literature Database
Practical Fast Gradient Sign Attack against Mammographic Image Classifier Authors: Ibrahim Yilmaz | Published: 2020-01-27 Adversarial LearningAdversarial Attack DetectionMachine Learning Method 2020.01.27 2025.05.28 Literature Database
Ensemble Noise Simulation to Handle Uncertainty about Gradient-based Adversarial Attacks Authors: Rehana Mahfuz, Rajeev Sahay, Aly El Gamal | Published: 2020-01-26 Adversarial LearningAdversarial Attack DetectionEffectiveness Analysis of Defense Methods 2020.01.26 2025.05.28 Literature Database
Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks Authors: Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan | Published: 2020-01-16 Adversarial ExampleAdversarial LearningComputational Complexity 2020.01.16 2025.05.28 Literature Database
A simple way to make neural networks robust against diverse image corruptions Authors: Evgenia Rusak, Lukas Schott, Roland S. Zimmermann, Julian Bitterwolf, Oliver Bringmann, Matthias Bethge, Wieland Brendel | Published: 2020-01-16 | Updated: 2020-07-22 Robustness AnalysisConvergence analysisAdversarial Learning 2020.01.16 2025.05.28 Literature Database
Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet Authors: Sizhe Chen, Zhengbao He, Chengjin Sun, Jie Yang, Xiaolin Huang | Published: 2020-01-16 | Updated: 2020-10-21 Adversarial LearningAdversarial Attack DetectionResearch Methodology 2020.01.16 2025.05.28 Literature Database
To Transfer or Not to Transfer: Misclassification Attacks Against Transfer Learned Text Classifiers Authors: Bijeeta Pal, Shruti Tople | Published: 2020-01-08 Prompt InjectionMembership InferenceAdversarial Learning 2020.01.08 2025.05.28 Literature Database
Softmax-based Classification is k-means Clustering: Formal Proof, Consequences for Adversarial Attacks, and Improvement through Centroid Based Tailoring Authors: Sibylle Hess, Wouter Duivesteijn, Decebal Mocanu | Published: 2020-01-07 Clustering methodsRobustness EvaluationAdversarial Learning 2020.01.07 2025.05.28 Literature Database
WAF-A-MoLE: Evading Web Application Firewalls through Adversarial Machine Learning Authors: Luca Demetrio, Andrea Valenza, Gabriele Costa, Giovanni Lagorio | Published: 2020-01-07 Robustness EvaluationMalicious ClientAdversarial Learning 2020.01.07 2025.05.28 Literature Database