Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization Authors: Bao Wang, Alex T. Lin, Wei Zhu, Penghang Yin, Andrea L. Bertozzi, Stanley J. Osher | Published: 2018-09-23 | Updated: 2020-04-29 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2018.09.23 2025.05.28 Literature Database
Unrestricted Adversarial Examples Authors: Tom B. Brown, Nicholas Carlini, Chiyuan Zhang, Catherine Olsson, Paul Christiano, Ian Goodfellow | Published: 2018-09-22 Robustness Improvement MethodAdversarial Attack MethodsDefense Mechanism 2018.09.22 2025.05.28 Literature Database
Adversarial Recommendation: Attack of the Learned Fake Users Authors: Konstantina Christakopoulou, Arindam Banerjee | Published: 2018-09-21 Adversarial ExampleAdversarial Attack MethodsGenerative Model 2018.09.21 2025.05.28 Literature Database
Adversarial Binaries for Authorship Identification Authors: Xiaozhu Meng, Barton P. Miller, Somesh Jha | Published: 2018-09-21 | Updated: 2018-11-07 Binary DiversificationAdversarial LearningAdversarial Attack Methods 2018.09.21 2025.05.28 Literature Database
Playing the Game of Universal Adversarial Perturbations Authors: Julien Perolat, Mateusz Malinowski, Bilal Piot, Olivier Pietquin | Published: 2018-09-20 | Updated: 2018-09-25 Robustness Improvement MethodAdversarial LearningAdversarial Attack Methods 2018.09.20 2025.05.28 Literature Database
HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples Authors: Deqiang Li, Ramesh Baral, Tao Li, Han Wang, Qianmu Li, Shouhuai Xu | Published: 2018-09-18 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2018.09.18 2025.05.28 Literature Database
Adversarial Reinforcement Learning for Observer Design in Autonomous Systems under Cyber Attacks Authors: Abhishek Gupta, Zhaoyuan Yang | Published: 2018-09-15 Online LearningRobustness Improvement MethodAdversarial Attack Methods 2018.09.15 2025.05.28 Literature Database
Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers Authors: Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach | Published: 2018-04-23 | Updated: 2020-10-03 Query Generation MethodCertified RobustnessAdversarial Attack Methods 2018.04.23 2025.05.28 Literature Database
Black-box Adversarial Attacks with Limited Queries and Information Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin | Published: 2018-04-23 | Updated: 2018-07-11 Model Extraction AttackAdversarial ExampleAdversarial Attack Methods 2018.04.23 2025.05.28 Literature Database
Gradient Masking Causes CLEVER to Overestimate Adversarial Perturbation Size Authors: Ian Goodfellow | Published: 2018-04-21 Adversarial LearningAdversarial Attack MethodsWatermarking Technology 2018.04.21 2025.05.28 Literature Database