There is Limited Correlation between Coverage and Robustness for Deep Neural Networks Authors: Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Dai Ting | Published: 2019-11-14 Model Performance EvaluationAdversarial ExampleAdversarial Attack Methods 2019.11.14 2025.05.28 Literature Database
Adversarial Examples in Modern Machine Learning: A Review Authors: Rey Reza Wiyatno, Anqi Xu, Ousmane Dia, Archy de Berker | Published: 2019-11-13 | Updated: 2019-11-15 PoisoningAdversarial ExampleAdversarial Attack Methods 2019.11.13 2025.05.28 Literature Database
On Robustness to Adversarial Examples and Polynomial Optimization Authors: Pranjal Awasthi, Abhratanu Dutta, Aravindan Vijayaraghavan | Published: 2019-11-12 Model Performance EvaluationAdversarial Attack MethodsComputational Problem 2019.11.12 2025.05.28 Literature Database
Patch augmentation: Towards efficient decision boundaries for neural networks Authors: Marcus D. Bloice, Peter M. Roth, Andreas Holzinger | Published: 2019-11-08 | Updated: 2019-11-25 Model Performance EvaluationAdversarial Attack MethodsFeature Engineering 2019.11.08 2025.05.28 Literature Database
White-Box Target Attack for EEG-Based BCI Regression Problems Authors: Lubin Meng, Chin-Teng Lin, Tzyy-Ring Jung, Dongrui Wu | Published: 2019-11-07 Model Performance EvaluationAdversarial Attack MethodsKnowledge Transferability 2019.11.07 2025.05.28 Literature Database
Confidence-Calibrated Adversarial Training: Generalizing to Unseen Attacks Authors: David Stutz, Matthias Hein, Bernt Schiele | Published: 2019-10-14 | Updated: 2020-06-30 PoisoningAttack EvaluationAdversarial Attack Methods 2019.10.14 2025.05.28 Literature Database
Hear “No Evil”, See “Kenansville”: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems Authors: Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor | Published: 2019-10-11 Attack EvaluationAdversarial Attack MethodsSpeech Recognition Technology 2019.10.11 2025.05.28 Literature Database
Adversarial Training: embedding adversarial perturbations into the parameter space of a neural network to build a robust system Authors: Shixian Wen, Laurent Itti | Published: 2019-10-09 Adversarial ExampleAdversarial Attack MethodsAdaptive Adversarial Training 2019.10.09 2025.05.28 Literature Database
Deep Latent Defence Authors: Giulio Zizzo, Chris Hankin, Sergio Maffeis, Kevin Jones | Published: 2019-10-09 | Updated: 2020-09-27 Adversarial ExampleAdversarial Attack MethodsAdaptive Adversarial Training 2019.10.09 2025.05.28 Literature Database
Adversarial Learning of Deepfakes in Accounting Authors: Marco Schreyer, Timur Sattarov, Bernd Reimer, Damian Borth | Published: 2019-10-09 Data Integrity ConstraintsAdversarial Attack MethodsGenerative Adversarial Network 2019.10.09 2025.05.28 Literature Database