A Little Is Enough: Circumventing Defenses For Distributed Learning Authors: Moran Baruch, Gilad Baruch, Yoav Goldberg | Published: 2019-02-16 Adversarial LearningAdversarial attackAdversarial Attack Methods 2019.02.16 2025.05.28 Literature Database
Mitigation of Adversarial Examples in RF Deep Classifiers Utilizing AutoEncoder Pre-training Authors: Silvija Kokalj-Filipovic, Rob Miller, Nicholas Chang, Chi Leung Lau | Published: 2019-02-16 PoisoningAdversarial attackAdversarial Attack Methods 2019.02.16 2025.05.28 Literature Database
Adversarial Examples in RF Deep Learning: Detection of the Attack and its Physical Robustness Authors: Silvija Kokalj-Filipovic, Rob Miller | Published: 2019-02-16 Adversarial ExampleAdversarial attackAdversarial Attack Methods 2019.02.16 2025.05.28 Literature Database
Can Intelligent Hyperparameter Selection Improve Resistance to Adversarial Examples? Authors: Cody Burkard, Brent Lagesse | Published: 2019-02-14 Adversarial ExampleAdversarial Example DetectionAdversarial Attack Methods 2019.02.14 2025.05.28 Literature Database
The Odds are Odd: A Statistical Test for Detecting Adversarial Examples Authors: Kevin Roth, Yannic Kilcher, Thomas Hofmann | Published: 2019-02-13 | Updated: 2019-05-09 Certified RobustnessAdversarial attackAdversarial Attack Methods 2019.02.13 2025.05.28 Literature Database
Adversarial Samples on Android Malware Detection Systems for IoT Systems Authors: Xiaolei Liu, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Mohsen Guizani | Published: 2019-02-12 Malware Detection MethodAdversarial Attack MethodsOptimization Strategy 2019.02.12 2025.05.28 Literature Database
Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis Authors: Danilo Vasconcellos Vargas, Jiawei Su | Published: 2019-02-08 Certified RobustnessAdversarial Attack MethodsImage Classification Interpretation 2019.02.08 2025.05.28 Literature Database
ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System Authors: Huangxun Chen, Chenyu Huang, Qianyi Huang, Qian Zhang, Wei Wang | Published: 2019-01-12 | Updated: 2020-01-14 Trigger DetectionModel EvaluationAdversarial Attack Methods 2019.01.12 2025.05.28 Literature Database
Exploring Adversarial Examples in Malware Detection Authors: Octavian Suciu, Scott E. Coull, Jeffrey Johns | Published: 2018-10-18 | Updated: 2019-04-13 PoisoningAdversarial ExampleAdversarial Attack Methods 2018.10.18 2025.05.28 Literature Database
A Training-based Identification Approach to VIN Adversarial Examples Authors: Yingdi Wang, Wenjia Niu, Tong Chen, Yingxiao Xiang, Jingjing Liu, Gang Li, Jiqiang Liu | Published: 2018-10-18 Robustness Improvement MethodAdversarial Example DetectionAdversarial Attack Methods 2018.10.18 2025.05.28 Literature Database