Improving Resistance to Adversarial Deformations by Regularizing Gradients Authors: Pengfei Xia, Bin Li | Published: 2020-08-29 | Updated: 2020-10-06 PoisoningAdversarial ExampleAdversarial attack 2020.08.29 2025.05.28 Literature Database
Against Membership Inference Attack: Pruning is All You Need Authors: Yijue Wang, Chenghong Wang, Zigeng Wang, Shanglin Zhou, Hang Liu, Jinbo Bi, Caiwen Ding, Sanguthevar Rajasekaran | Published: 2020-08-28 | Updated: 2021-07-04 Membership InferenceAdversarial attackDeep Learning Technology 2020.08.28 2025.05.28 Literature Database
Adversarial Eigen Attack on Black-Box Models Authors: Linjun Zhou, Peng Cui, Yinan Jiang, Shiqiang Yang | Published: 2020-08-27 Adversarial attackOptimization StrategyDeep Learning Technology 2020.08.27 2025.05.28 Literature Database
Stronger and Faster Wasserstein Adversarial Attacks Authors: Kaiwen Wu, Allen Houze Wang, Yaoliang Yu | Published: 2020-08-06 WatermarkingAdversarial LearningAdversarial attack 2020.08.06 2025.05.28 Literature Database
TREND: Transferability based Robust ENsemble Design Authors: Deepak Ravikumar, Sangamesh Kodge, Isha Garg, Kaushik Roy | Published: 2020-08-04 | Updated: 2021-03-30 Adversarial ExampleAdversarial attackTransfer Learning 2020.08.04 2025.05.28 Literature Database
Robust and Accurate Authorship Attribution via Program Normalization Authors: Yizhen Wang, Mohannad Alhanahnah, Ke Wang, Mihai Christodorescu, Somesh Jha | Published: 2020-07-01 | Updated: 2022-02-25 Membership InferenceRobustnessAdversarial attack 2020.07.01 2025.05.28 Literature Database
Opportunities and Challenges in Deep Learning Adversarial Robustness: A Survey Authors: Samuel Henrique Silva, Peyman Najafirad | Published: 2020-07-01 | Updated: 2020-07-03 PoisoningAdversarial ExampleAdversarial attack 2020.07.01 2025.05.28 Literature Database
A Le Cam Type Bound for Adversarial Learning and Applications Authors: Qiuling Xu, Kevin Bello, Jean Honorio | Published: 2020-07-01 | Updated: 2021-02-10 Adversarial ExampleAdversarial attackMachine Learning Method 2020.07.01 2025.05.28 Literature Database
Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection Authors: Deqiang Li, Qianmu Li | Published: 2020-06-30 PoisoningMalware EvolutionAdversarial attack 2020.06.30 2025.05.28 Literature Database
FDA3 : Federated Defense Against Adversarial Attacks for Cloud-Based IIoT Applications Authors: Yunfei Song, Tian Liu, Tongquan Wei, Xiangfeng Wang, Zhe Tao, Mingsong Chen | Published: 2020-06-28 Adversarial ExampleAdversarial attackDefense Mechanism 2020.06.28 2025.05.28 Literature Database