Adversarial Perturbations Fool Deepfake Detectors Authors: Apurva Gandhi, Shomik Jain | Published: 2020-03-24 | Updated: 2020-05-15 Adversarial ExampleAdversarial Attack MethodsDefense Method 2020.03.24 2025.05.28 Literature Database
Adversarial Transferability in Wearable Sensor Systems Authors: Ramesh Kumar Sah, Hassan Ghasemzadeh | Published: 2020-03-17 | Updated: 2021-07-15 Adversarial ExampleAdversarial Attack MethodsNon-Identical Dataset 2020.03.17 2025.05.28 Literature Database
Diversity can be Transferred: Output Diversification for White- and Black-box Attacks Authors: Yusuke Tashiro, Yang Song, Stefano Ermon | Published: 2020-03-15 | Updated: 2020-10-30 PoisoningAdversarial Attack MethodsVulnerability Attack Method 2020.03.15 2025.05.28 Literature Database
A Survey of Adversarial Learning on Graphs Authors: Liang Chen, Jintang Li, Jiaying Peng, Tao Xie, Zengxu Cao, Kun Xu, Xiangnan He, Zibin Zheng, Bingzhe Wu | Published: 2020-03-10 | Updated: 2022-04-05 PoisoningAdversarial Attack MethodsDefense Method 2020.03.10 2025.05.28 Literature Database
Security of Distributed Machine Learning: A Game-Theoretic Approach to Design Secure DSVM Authors: Rui Zhang, Quanyan Zhu | Published: 2020-03-08 | Updated: 2020-04-26 Game TheoryPoisoningAdversarial Attack Methods 2020.03.08 2025.05.28 Literature Database
Identifying Audio Adversarial Examples via Anomalous Pattern Detection Authors: Victor Akinwande, Celia Cintas, Skyler Speakman, Srihari Sridharan | Published: 2020-02-13 | Updated: 2020-07-25 Vulnerability of Adversarial ExamplesAdversarial Attack MethodsMachine Learning Application 2020.02.13 2025.05.28 Literature Database
Over-the-Air Adversarial Flickering Attacks against Video Recognition Networks Authors: Roi Pony, Itay Naeh, Shie Mannor | Published: 2020-02-12 | Updated: 2021-06-04 Video ClassificationExpression of GratitudeAdversarial Attack Methods 2020.02.12 2025.05.28 Literature Database
Attack based DoS attack detection using multiple classifier Authors: Mohamed Abushwereb, Muhannad Mustafa, Mouhammd Al-kasassbeh, Malik Qasaimeh | Published: 2020-01-16 DDoS Attack DetectionNetwork Threat DetectionAdversarial Attack Methods 2020.01.16 2025.05.28 Literature Database
Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning Authors: Roei Schuster, Tal Schuster, Yoav Meri, Vitaly Shmatikov | Published: 2020-01-14 Membership InferenceAdversarial Attack MethodsStatistical Analysis 2020.01.14 2025.05.28 Literature Database
Advbox: a toolbox to generate adversarial examples that fool neural networks Authors: Dou Goodman, Hao Xin, Wang Yang, Wu Yuesheng, Xiong Junfeng, Zhang Huan | Published: 2020-01-13 | Updated: 2020-08-26 PoisoningAdversarial ExampleAdversarial Attack Methods 2020.01.13 2025.05.28 Literature Database