Towards non-toxic landscapes: Automatic toxic comment detection using DNN Authors: Ashwin Geet D'Sa, Irina Illina, Dominique Fohr | Published: 2019-11-19 | Updated: 2020-09-16 Class ImbalanceModel Performance EvaluationAdversarial Attack Methods 2019.11.19 2025.05.28 Literature Database
Deep Detector Health Management under Adversarial Campaigns Authors: Javier Echauz, Keith Kenemer, Sarfaraz Hussein, Jay Dhaliwal, Saurabh Shintre, Slawomir Grzonkowski, Andrew Gardner | Published: 2019-11-19 Class ImbalanceAdversarial ExampleAdversarial Attack Methods 2019.11.19 2025.05.28 Literature Database
Attack on Grid Event Cause Analysis: An Adversarial Machine Learning Approach Authors: Iman Niazazari, Hanif Livani | Published: 2019-11-19 | Updated: 2019-11-25 Adversarial ExampleAdversarial Attack MethodsEffectiveness Analysis of Defense Methods 2019.11.19 2025.05.28 Literature Database
WITCHcraft: Efficient PGD attacks with random step size Authors: Ping-Yeh Chiang, Jonas Geiping, Micah Goldblum, Tom Goldstein, Renkun Ni, Steven Reich, Ali Shafahi | Published: 2019-11-18 Convergence AnalysisReinforcement Learning AttackAdversarial Attack Methods 2019.11.18 2025.05.28 Literature Database
Can You Really Backdoor Federated Learning? Authors: Ziteng Sun, Peter Kairouz, Ananda Theertha Suresh, H. Brendan McMahan | Published: 2019-11-18 | Updated: 2019-12-02 Adversarial Attack MethodsThreat ModelEffectiveness Analysis of Defense Methods 2019.11.18 2025.05.28 Literature Database
A New Ensemble Adversarial Attack Powered by Long-term Gradient Memories Authors: Zhaohui Che, Ali Borji, Guangtao Zhai, Suiyi Ling, Jing Li, Patrick Le Callet | Published: 2019-11-18 Backdoor AttackModel Performance EvaluationAdversarial Attack Methods 2019.11.18 2025.05.28 Literature Database
Black-Box Adversarial Attack with Transferable Model-based Embedding Authors: Zhichao Huang, Tong Zhang | Published: 2019-11-17 | Updated: 2020-01-05 Adversarial ExampleAdversarial Attack MethodsKnowledge Transferability 2019.11.17 2025.05.28 Literature Database
Defending Against Model Stealing Attacks with Adaptive Misinformation Authors: Sanjay Kariyappa, Moinuddin K Qureshi | Published: 2019-11-16 Adversarial ExampleAdversarial Attack MethodsEffectiveness Analysis of Defense Methods 2019.11.16 2025.05.28 Literature Database
Suspicion-Free Adversarial Attacks on Clustering Algorithms Authors: Anshuman Chhabra, Abhishek Roy, Prasant Mohapatra | Published: 2019-11-16 Model Performance EvaluationNumerical Stability IssuesAdversarial Attack Methods 2019.11.16 2025.05.28 Literature Database
DomainGAN: Generating Adversarial Examples to Attack Domain Generation Algorithm Classifiers Authors: Isaac Corley, Jonathan Lwowski, Justin Hoffman | Published: 2019-11-14 | Updated: 2020-02-14 Botnet DetectionModel Performance EvaluationAdversarial Attack Methods 2019.11.14 2025.05.28 Literature Database