Learn to Adapt: Robust Drift Detection in Security Domain Authors: Aditya Kuppa, Nhien-An Le-Khac | Published: 2022-06-15 Drift Detection MethodPerformance Evaluation MetricsAdversarial Learning 2022.06.15 2025.05.28 Literature Database
NICGSlowDown: Evaluating the Efficiency Robustness of Neural Image Caption Generation Models Authors: Simin Chen, Zihe Song, Mirazul Haque, Cong Liu, Wei Yang | Published: 2022-03-29 Model DoSAdversarial ExampleAdversarial Learning 2022.03.29 2025.05.28 Literature Database
Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza | Published: 2021-12-22 PoisoningAdversarial LearningDefense Method 2021.12.22 2025.05.28 Literature Database
Robustness of Graph Neural Networks at Scale Authors: Simon Geisler, Tobias Schmidt, Hakan Şirin, Daniel Zügner, Aleksandar Bojchevski, Stephan Günnemann | Published: 2021-10-26 | Updated: 2023-04-30 Graph Representation LearningRobustnessAdversarial Learning 2021.10.26 2025.05.28 Literature Database
The mathematics of adversarial attacks in AI — Why deep learning is unstable despite the existence of stable neural networks Authors: Alexander Bastounis, Anders C Hansen, Verner Vlačić | Published: 2021-09-13 | Updated: 2025-03-26 AlgorithmGeneralization PerformanceAdversarial Learning 2021.09.13 2025.05.28 Literature Database
Formalizing and Estimating Distribution Inference Risks Authors: Anshuman Suri, David Evans | Published: 2021-09-13 | Updated: 2022-07-05 Data LeakageMembership InferenceAdversarial Learning 2021.09.13 2025.05.28 Literature Database
On the Robustness of Domain Constraints Authors: Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick McDaniel | Published: 2021-05-18 | Updated: 2021-11-07 Data Integrity ConstraintsMembership InferenceAdversarial Learning 2021.05.18 2025.05.28 Literature Database
Undistillable: Making A Nasty Teacher That CANNOT teach students Authors: Haoyu Ma, Tianlong Chen, Ting-Kuei Hu, Chenyu You, Xiaohui Xie, Zhangyang Wang | Published: 2021-05-16 Adversarial LearningDeep Learning TechnologySelf-Supervised Learning 2021.05.16 2025.05.28 Literature Database
Cybersecurity Anomaly Detection in Adversarial Environments Authors: David A. Bierbrauer, Alexander Chang, Will Kritzer, Nathaniel D. Bastian | Published: 2021-05-14 | Updated: 2021-11-02 ML-Based IDSModel SelectionAdversarial Learning 2021.05.14 2025.05.28 Literature Database
Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain Authors: Jinyu Tian, Jiantao Zhou, Yuanman Li, Jia Duan | Published: 2021-03-07 Attack Scenario AnalysisAdversarial Example DetectionAdversarial Learning 2021.03.07 2025.05.28 Literature Database