Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-12-03 | Updated: 2021-03-09 Attack MethodAdversarial ExampleAdversarial Learning 2020.12.03 2025.05.28 Literature Database
Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme Authors: Kunjal Panchal | Published: 2020-10-29 Password GuessingAdversarial LearningGenerative Model Characteristics 2020.10.29 2025.05.28 Literature Database
Understanding Catastrophic Overfitting in Single-step Adversarial Training Authors: Hoki Kim, Woojin Lee, Jaewook Lee | Published: 2020-10-05 | Updated: 2020-12-15 PoisoningRobustness EvaluationAdversarial Learning 2020.10.05 2025.05.28 Literature Database
Adversarially Training for Audio Classifiers Authors: Raymel Alfonso Sallo, Mohammad Esmaeilpour, Patrick Cardinal | Published: 2020-08-26 | Updated: 2020-10-25 Adversarial ExampleAdversarial LearningSpeech Signal Processing 2020.08.26 2025.05.28 Literature Database
Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning Authors: Yinghua Zhang, Yangqiu Song, Jian Liang, Kun Bai, Qiang Yang | Published: 2020-08-25 PoisoningAdversarial LearningDeep Learning 2020.08.25 2025.05.28 Literature Database
Near Optimal Adversarial Attacks on Stochastic Bandits and Defenses with Smoothed Responses Authors: Shiliang Zuo | Published: 2020-08-21 | Updated: 2024-03-14 Game TheoryAttack MethodAdversarial Learning 2020.08.21 2025.05.28 Literature Database
Defending Distributed Classifiers Against Data Poisoning Attacks Authors: Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie | Published: 2020-08-21 PoisoningAttack MethodAdversarial Learning 2020.08.21 2025.05.28 Literature Database
Stronger and Faster Wasserstein Adversarial Attacks Authors: Kaiwen Wu, Allen Houze Wang, Yaoliang Yu | Published: 2020-08-06 WatermarkingAdversarial LearningAdversarial attack 2020.08.06 2025.05.28 Literature Database
Training DNN Model with Secret Key for Model Protection Authors: MaungMaung AprilPyone, Hitoshi Kiya | Published: 2020-08-06 WatermarkingAdversarial LearningMachine Learning 2020.08.06 2025.05.28 Literature Database
On the relationship between class selectivity, dimensionality, and robustness Authors: Matthew L. Leavitt, Ari S. Morcos | Published: 2020-07-08 | Updated: 2020-10-13 PoisoningAdversarial LearningVulnerability Analysis 2020.07.08 2025.05.28 Literature Database