Cybersecurity Anomaly Detection in Adversarial Environments Authors: David A. Bierbrauer, Alexander Chang, Will Kritzer, Nathaniel D. Bastian | Published: 2021-05-14 | Updated: 2021-11-02 ML-Based IDSModel SelectionAdversarial Learning 2021.05.14 2025.05.28 Literature Database
Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain Authors: Jinyu Tian, Jiantao Zhou, Yuanman Li, Jia Duan | Published: 2021-03-07 Attack Scenario AnalysisAdversarial Example DetectionAdversarial Learning 2021.03.07 2025.05.28 Literature Database
With False Friends Like These, Who Can Notice Mistakes? Authors: Lue Tao, Lei Feng, Jinfeng Yi, Songcan Chen | Published: 2020-12-29 | Updated: 2021-12-13 Adversarial ExampleAdversarial LearningDefense Mechanism 2020.12.29 2025.05.28 Literature Database
Autoencoding Variational Autoencoder Authors: A. Taylan Cemgil, Sumedh Ghaisas, Krishnamurthy Dvijotham, Sven Gowal, Pushmeet Kohli | Published: 2020-12-07 Adversarial LearningGenerative Model CharacteristicsSelf-Learning Method 2020.12.07 2025.05.28 Literature Database
TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic Authors: Peter Jachim, Filipo Sharevski, Paige Treebridge | Published: 2020-12-04 | Updated: 2020-12-07 Content ModerationSecurity AnalysisAdversarial Learning 2020.12.04 2025.05.28 Literature Database
Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-12-03 | Updated: 2021-03-09 Attack MethodAdversarial ExampleAdversarial Learning 2020.12.03 2025.05.28 Literature Database
Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme Authors: Kunjal Panchal | Published: 2020-10-29 Password GuessingAdversarial LearningGenerative Model Characteristics 2020.10.29 2025.05.28 Literature Database
Understanding Catastrophic Overfitting in Single-step Adversarial Training Authors: Hoki Kim, Woojin Lee, Jaewook Lee | Published: 2020-10-05 | Updated: 2020-12-15 PoisoningRobustness EvaluationAdversarial Learning 2020.10.05 2025.05.28 Literature Database
Adversarially Training for Audio Classifiers Authors: Raymel Alfonso Sallo, Mohammad Esmaeilpour, Patrick Cardinal | Published: 2020-08-26 | Updated: 2020-10-25 Adversarial ExampleAdversarial LearningSpeech Signal Processing 2020.08.26 2025.05.28 Literature Database
Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning Authors: Yinghua Zhang, Yangqiu Song, Jian Liang, Kun Bai, Qiang Yang | Published: 2020-08-25 PoisoningAdversarial LearningDeep Learning 2020.08.25 2025.05.28 Literature Database