Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking Authors: Yunhan Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Zhenyu Zhong, Tao Wei | Published: 2019-05-27 | Updated: 2019-05-30 CybersecurityTracking MethodAdversarial Attack Methods 2019.05.27 2025.05.28 Literature Database
Weight Map Layer for Noise and Adversarial Attack Robustness Authors: Mohammed Amer, Tomás Maul | Published: 2019-05-02 | Updated: 2020-12-02 Robust EstimationFuture ResearchAdversarial Attack Methods 2019.05.02 2025.05.28 Literature Database
NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks Authors: Yandong Li, Lijun Li, Liqiang Wang, Tong Zhang, Boqing Gong | Published: 2019-05-01 | Updated: 2019-12-09 Adversarial ExampleAdversarial Attack MethodsDeep Learning Technology 2019.05.01 2025.05.28 Literature Database
Detecting Adversarial Examples through Nonlinear Dimensionality Reduction Authors: Francesco Crecchi, Davide Bacciu, Battista Biggio | Published: 2019-04-30 | Updated: 2019-05-01 Adversarial ExampleAdversarial Attack MethodsDeep Learning Technology 2019.04.30 2025.05.28 Literature Database
Adversarial Training and Robustness for Multiple Perturbations Authors: Florian Tramèr, Dan Boneh | Published: 2019-04-30 | Updated: 2019-10-18 Robust EstimationAdversarial ExampleAdversarial Attack Methods 2019.04.30 2025.05.28 Literature Database
A Robust Approach for Securing Audio Classification Against Adversarial Attacks Authors: Mohammad Esmaeilpour, Patrick Cardinal, Alessandro Lameiras Koerich | Published: 2019-04-24 | Updated: 2019-11-25 Backdoor AttackAdversarial ExampleAdversarial Attack Methods 2019.04.24 2025.05.28 Literature Database
A Target-Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning Authors: Shahbaz Rezaei, Xin Liu | Published: 2019-04-08 | Updated: 2020-01-29 Model evaluation methodsAdversarial Attack MethodsDeep Learning Technology 2019.04.08 2025.05.28 Literature Database
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems Authors: Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson | Published: 2019-03-18 Signal Processing TechniquesAdversarial Attack MethodsSpeech Synthesis Technology 2019.03.18 2025.05.28 Literature Database
A Research Agenda: Dynamic Models to Defend Against Correlated Attacks Authors: Ian Goodfellow | Published: 2019-03-14 Certified RobustnessDynamic Service SchedulingAdversarial Attack Methods 2019.03.14 2025.05.28 Literature Database
Attribution-driven Causal Analysis for Detection of Adversarial Examples Authors: Susmit Jha, Sunny Raj, Steven Lawrence Fernandes, Sumit Kumar Jha, Somesh Jha, Gunjan Verma, Brian Jalaian, Ananthram Swami | Published: 2019-03-14 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2019.03.14 2025.05.28 Literature Database