Defending Against Adversarial Attacks by Suppressing the Largest Eigenvalue of Fisher Information Matrix Authors: Chaomin Shen, Yaxin Peng, Guixu Zhang, Jinsong Fan | Published: 2019-09-13 Performance EvaluationAdversarial ExampleAdversarial Learning 2019.09.13 2025.05.28 Literature Database
Black-box Adversarial ML Attack on Modulation Classification Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-08-01 Information SecurityAdversarial LearningDeep Learning Method 2019.08.01 2025.05.28 Literature Database
Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT Authors: Alireza Nooraiepour, Waheed U. Bajwa, Narayan B. Mandayam | Published: 2019-08-01 | Updated: 2020-07-04 Adversarial LearningPhysical layer securityCommunication Model 2019.08.01 2025.05.28 Literature Database
Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding Authors: Utku Ozbulak, Arnout Van Messem, Wesley De Neve | Published: 2019-07-30 Taxonomy of AttacksAdversarial ExampleAdversarial Learning 2019.07.30 2025.05.28 Literature Database
Adversarial Robustness Assessment: Why both $L_0$ and $L_\infty$ Attacks Are Necessary Authors: Shashank Kotyan, Danilo Vasconcellos Vargas | Published: 2019-06-14 | Updated: 2020-07-16 Adversarial ExampleAdversarial LearningDefense Method 2019.06.14 2025.05.28 Literature Database
Evolutionary Trigger Set Generation for DNN Black-Box Watermarking Authors: Jia Guo, Miodrag Potkonjak | Published: 2019-06-11 | Updated: 2021-02-14 DNN IP Protection MethodAdversarial LearningDeep Learning 2019.06.11 2025.05.28 Literature Database
Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective Authors: Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, Xue Lin | Published: 2019-06-10 | Updated: 2019-10-14 Adversarial LearningSelection and Evaluation of Optimization AlgorithmsDefense Method 2019.06.10 2025.05.28 Literature Database
Attacking Graph Convolutional Networks via Rewiring Authors: Yao Ma, Suhang Wang, Tyler Derr, Lingfei Wu, Jiliang Tang | Published: 2019-06-10 | Updated: 2019-09-28 Reinforcement Learning AttackAdversarial LearningDeep Reinforcement Learning 2019.06.10 2025.05.28 Literature Database
Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers Authors: Hadi Salman, Greg Yang, Jerry Li, Pengchuan Zhang, Huan Zhang, Ilya Razenshteyn, Sebastien Bubeck | Published: 2019-06-09 | Updated: 2020-01-10 PoisoningAdversarial LearningDefense Method 2019.06.09 2025.05.28 Literature Database
Adversarial Attack Generation Empowered by Min-Max Optimization Authors: Jingkang Wang, Tianyun Zhang, Sijia Liu, Pin-Yu Chen, Jiacen Xu, Makan Fardad, Bo Li | Published: 2019-06-09 | Updated: 2021-11-01 Adversarial LearningDeep LearningDefense Method 2019.06.09 2025.05.28 Literature Database