Generating Semantic Adversarial Examples via Feature Manipulation Authors: Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen | Published: 2020-01-06 | Updated: 2022-05-20 Data GenerationAdversarial ExampleAdversarial Learning 2020.01.06 2025.05.28 Literature Database
Toward Optimal Adversarial Policies in the Multiplicative Learning System with a Malicious Expert Authors: S. Rasoul Etesami, Negar Kiyavash, Vincent Leon, H. Vincent Poor | Published: 2020-01-02 | Updated: 2020-09-18 Adversarial LearningOptimization MethodsStatistical Methods 2020.01.02 2025.05.28 Literature Database
ATHENA: A Framework based on Diverse Weak Defenses for Building Adversarial Defense Authors: Ying Meng, Jianhai Su, Jason O'Kane, Pooyan Jamshidi | Published: 2020-01-02 | Updated: 2020-10-16 Adversarial LearningWatermark EvaluationEffectiveness Analysis of Defense Methods 2020.01.02 2025.05.28 Literature Database
Face X-ray for More General Face Forgery Detection Authors: Lingzhi Li, Jianmin Bao, Ting Zhang, Hao Yang, Dong Chen, Fang Wen, Baining Guo | Published: 2019-12-31 | Updated: 2020-04-19 AlgorithmDetection of DeepfakesAdversarial Learning 2019.12.31 2025.05.28 Literature Database
Adversarial Example Generation using Evolutionary Multi-objective Optimization Authors: Takahiro Suzuki, Shingo Takeshita, Satoshi Ono | Published: 2019-12-30 Effective Perturbation MethodsMulti-Objective OptimizationAdversarial Learning 2019.12.30 2025.05.28 Literature Database
Federated Variance-Reduced Stochastic Gradient Descent with Robustness to Byzantine Attacks Authors: Zhaoxian Wu, Qing Ling, Tianyi Chen, Georgios B. Giannakis | Published: 2019-12-29 | Updated: 2021-02-03 SGD CharacteristicsRobustness EvaluationAdversarial Learning 2019.12.29 2025.05.28 Literature Database
Cyber Situation Awareness with Active Learning for Intrusion Detection Authors: Steven McElwee, James Cannady | Published: 2019-12-29 Model Selection MethodAdversarial LearningAutomated Intrusion Detection System 2019.12.29 2025.05.28 Literature Database
secml: A Python Library for Secure and Explainable Machine Learning Authors: Maura Pintor, Luca Demetrio, Angelo Sotgiu, Marco Melis, Ambra Demontis, Battista Biggio | Published: 2019-12-20 | Updated: 2022-05-13 PoisoningAdversarial LearningWatermark Evaluation 2019.12.20 2025.05.28 Literature Database
Explainability and Adversarial Robustness for RNNs Authors: Alexander Hartl, Maximilian Bachl, Joachim Fabini, Tanja Zseby | Published: 2019-12-20 | Updated: 2020-02-19 Taxonomy of AttacksAdversarial LearningEffectiveness Analysis of Defense Methods 2019.12.20 2025.05.28 Literature Database
Random CapsNet Forest Model for Imbalanced Malware Type Classification Task Authors: Aykut Çayır, Uğur Ünal, Hasan Dağ | Published: 2019-12-20 | Updated: 2020-08-23 Adversarial LearningDeep LearningWatermark Evaluation 2019.12.20 2025.05.28 Literature Database