A principled approach for generating adversarial images under non-smooth dissimilarity metrics Authors: Aram-Alexandre Pooladian, Chris Finlay, Tim Hoheisel, Adam Oberman | Published: 2019-08-05 | Updated: 2019-10-08 Robustness Improvement MethodAttack EvaluationAdversarial Attack Methods 2019.08.05 2025.05.28 Literature Database
A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding Models Authors: Heng Chang, Yu Rong, Tingyang Xu, Wenbing Huang, Honglei Zhang, Peng Cui, Wenwu Zhu, Junzhou Huang | Published: 2019-08-04 | Updated: 2019-12-17 Graph FilteringPrompt InjectionAdversarial Attack Methods 2019.08.04 2025.05.28 Literature Database
Robustness properties of Facebook’s ResNeXt WSL models Authors: A. Emin Orhan | Published: 2019-07-17 | Updated: 2019-12-09 Adversarial Attack MethodsDeep Learning TechnologyWatermarking Technology 2019.07.17 2025.05.28 Literature Database
Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics Authors: Yuxin Ma, Tiankai Xie, Jundong Li, Ross Maciejewski | Published: 2019-07-17 | Updated: 2019-10-03 Backdoor AttackPoisoningAdversarial Attack Methods 2019.07.17 2025.05.28 Literature Database
Adversarial Security Attacks and Perturbations on Machine Learning and Deep Learning Methods Authors: Arif Siddiqi | Published: 2019-07-17 PoisoningAdversarial ExampleAdversarial Attack Methods 2019.07.17 2025.05.28 Literature Database
Latent Adversarial Defence with Boundary-guided Generation Authors: Xiaowei Zhou, Ivor W. Tsang, Jie Yin | Published: 2019-07-16 Adversarial ExampleAdversarial Attack MethodsDeep Learning Technology 2019.07.16 2025.05.28 Literature Database
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving Authors: Yulong Cao, Chaowei Xiao, Benjamin Cyr, Yimeng Zhou, Won Park, Sara Rampazzi, Qi Alfred Chen, Kevin Fu, Z. Morley Mao | Published: 2019-07-16 | Updated: 2019-08-20 Spoofing Attack AnalysisAdversarial Attack MethodsOptimization Methods 2019.07.16 2025.05.28 Literature Database
Bypassing Backdoor Detection Algorithms in Deep Learning Authors: Te Juin Lester Tan, Reza Shokri | Published: 2019-05-31 | Updated: 2020-06-06 Pruning MethodMembership InferenceAdversarial Attack Methods 2019.05.31 2025.05.28 Literature Database
Identifying Classes Susceptible to Adversarial Attacks Authors: Rangeet Pan, Md Johirul Islam, Shibbir Ahmed, Hridesh Rajan | Published: 2019-05-30 Vulnerability of Adversarial ExamplesAdversarial Attack MethodsDeep Learning 2019.05.30 2025.05.28 Literature Database
Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and The Way Forward Authors: Adnan Qayyum, Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-05-29 Backdoor AttackAdversarial ExampleAdversarial Attack Methods 2019.05.29 2025.05.28 Literature Database