Multi-Step Adversarial Perturbations on Recommender Systems Embeddings Authors: Vito Walter Anelli, Alejandro Bellogín, Yashar Deldjoo, Tommaso Di Noia, Felice Antonio Merra | Published: 2020-10-03 Robustness EvaluationAdversarial Perturbation TechniquesMachine Learning Method 2020.10.03 2025.05.13 Literature Database
Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning Authors: Jirong Yi, Raghu Mudumbai, Weiyu Xu | Published: 2020-07-28 Attack MethodAdversarial ExampleAdversarial Perturbation Techniques 2020.07.28 2025.05.13 Literature Database
Learning perturbation sets for robust machine learning Authors: Eric Wong, J. Zico Kolter | Published: 2020-07-16 | Updated: 2020-10-08 Performance EvaluationAdversarial Perturbation TechniquesGenerative Model Characteristics 2020.07.16 2025.05.13 Literature Database
Learning to Generate Noise for Multi-Attack Robustness Authors: Divyam Madaan, Jinwoo Shin, Sung Ju Hwang | Published: 2020-06-22 | Updated: 2021-06-24 Adversarial Perturbation TechniquesAdversarial Attack MethodsDefense Mechanism 2020.06.22 2025.05.13 Literature Database
Headless Horseman: Adversarial Attacks on Transfer Learning Models Authors: Ahmed Abdelkader, Michael J. Curry, Liam Fowl, Tom Goldstein, Avi Schwarzschild, Manli Shu, Christoph Studer, Chen Zhu | Published: 2020-04-20 PoisoningAdversarial Perturbation TechniquesMachine Learning 2020.04.20 2025.05.13 Literature Database
Protecting Classifiers From Attacks. A Bayesian Approach Authors: Victor Gallego, Roi Naveiro, Alberto Redondo, David Rios Insua, Fabrizio Ruggeri | Published: 2020-04-18 Multi-Class ClassificationAdversarial Perturbation TechniquesDefense Method 2020.04.18 2025.05.13 Literature Database
MAB-Malware: A Reinforcement Learning Framework for Attacking Static Malware Classifiers Authors: Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, Heng Yin | Published: 2020-03-06 | Updated: 2021-04-29 Malware ClassificationMalware DetectionAdversarial Perturbation Techniques 2020.03.06 2025.05.13 Literature Database
Confusing and Detecting ML Adversarial Attacks with Injected Attractors Authors: Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee | Published: 2020-03-05 | Updated: 2021-03-08 Adversarial Perturbation TechniquesWatermarking TechnologyDefense Method 2020.03.05 2025.05.13 Literature Database
Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks Authors: Francesco Croce, Matthias Hein | Published: 2020-03-03 | Updated: 2020-08-04 Robustness EvaluationAdversarial Perturbation TechniquesDefense Method 2020.03.03 2025.05.13 Literature Database
Input Validation for Neural Networks via Runtime Local Robustness Verification Authors: Jiangchao Liu, Liqian Chen, Antoine Mine, Ji Wang | Published: 2020-02-09 | Updated: 2024-02-13 Robustness Improvement MethodAdversarial ExampleAdversarial Perturbation Techniques 2020.02.09 2025.05.13 Literature Database