Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising Authors: Sandhya Aneja, Nagender Aneja, Pg Emeroylariffion Abas, Abdul Ghani Naim | Published: 2022-06-25 Algorithm DesignImprovement of LearningAdversarial Attack Methods 2022.06.25 2025.05.28 Literature Database
I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences Authors: Daryna Oliynyk, Rudolf Mayer, Andreas Rauber | Published: 2022-06-16 | Updated: 2023-06-06 PoisoningMembership InferenceAdversarial Attack Methods 2022.06.16 2025.05.28 Literature Database
Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection Authors: Abderrahmen Amich, Ata Kaboudi, Birhanu Eshete | Published: 2022-06-15 RobustnessAdversarial ExampleAdversarial Attack Methods 2022.06.15 2025.05.28 Literature Database
Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations Authors: Mohammad Mahmudul Alam, Edward Raff, Tim Oates, James Holt | Published: 2022-06-13 Training ProtocolAdversarial Attack MethodsDeep Learning Method 2022.06.13 2025.05.28 Literature Database
Darknet Traffic Classification and Adversarial Attacks Authors: Nhien Rust-Nguyen, Mark Stamp | Published: 2022-06-12 Performance EvaluationAdversarial Attack MethodsDeep Learning Method 2022.06.12 2025.05.28 Literature Database
Membership Inference via Backdooring Authors: Hongsheng Hu, Zoran Salcic, Gillian Dobbie, Jinjun Chen, Lichao Sun, Xuyun Zhang | Published: 2022-06-10 Attack Methods against DFLMembership InferenceAdversarial Attack Methods 2022.06.10 2025.05.28 Literature Database
Building Robust Ensembles via Margin Boosting Authors: Dinghuai Zhang, Hongyang Zhang, Aaron Courville, Yoshua Bengio, Pradeep Ravikumar, Arun Sai Suggala | Published: 2022-06-07 PoisoningRobustnessAdversarial Attack Methods 2022.06.07 2025.05.28 Literature Database
Improving Adversarial Robustness by Putting More Regularizations on Less Robust Samples Authors: Dongyoon Yang, Insung Kong, Yongdai Kim | Published: 2022-06-07 | Updated: 2023-06-01 RobustnessAdversarial ExampleAdversarial Attack Methods 2022.06.07 2025.05.28 Literature Database
White-box Membership Attack Against Machine Learning Based Retinopathy Classification Authors: Mounia Hamidouche, Reda Bellafqira, Gwenolé Quellec, Gouenou Coatrieux | Published: 2022-05-30 Attack Methods against DFLAdversarial Attack Methods 2022.05.30 2025.05.28 Literature Database
Adversarial attacks and defenses in Speaker Recognition Systems: A survey Authors: Jiahe Lan, Rui Zhang, Zheng Yan, Jie Wang, Yu Chen, Ronghui Hou | Published: 2022-05-27 Adversarial ExampleAdversarial Attack MethodsSpeech Recognition Process 2022.05.27 2025.05.28 Literature Database