Gradient-based adversarial attacks on categorical sequence models via traversing an embedded world Authors: Ivan Fursov, Alexey Zaytsev, Nikita Kluchnikov, Andrey Kravchenko, Evgeny Burnaev | Published: 2020-03-09 | Updated: 2020-10-12 Adversarial ExampleAdversarial attackGenerative Model 2020.03.09 2025.05.28 Literature Database
Graph Universal Adversarial Attacks: A Few Bad Actors Ruin Graph Learning Models Authors: Xiao Zang, Yi Xie, Jie Chen, Bo Yuan | Published: 2020-02-12 | Updated: 2021-06-23 Graph Neural NetworkGraph PrivacyAdversarial attack 2020.02.12 2025.05.28 Literature Database
Fundamental Tradeoffs between Invariance and Sensitivity to Adversarial Perturbations Authors: Florian Tramèr, Jens Behrmann, Nicholas Carlini, Nicolas Papernot, Jörn-Henrik Jacobsen | Published: 2020-02-11 | Updated: 2020-08-04 Robustness EvaluationAdversarial ExampleAdversarial attack 2020.02.11 2025.05.28 Literature Database
Robustness of Bayesian Neural Networks to Gradient-Based Attacks Authors: Ginevra Carbone, Matthew Wicker, Luca Laurenti, Andrea Patane, Luca Bortolussi, Guido Sanguinetti | Published: 2020-02-11 | Updated: 2020-06-24 Robustness EvaluationRobustness Improvement MethodAdversarial attack 2020.02.11 2025.05.28 Literature Database
Adversarial Attacks on Linear Contextual Bandits Authors: Evrard Garcelon, Baptiste Roziere, Laurent Meunier, Jean Tarbouriech, Olivier Teytaud, Alessandro Lazaric, Matteo Pirotta | Published: 2020-02-10 | Updated: 2020-10-23 Advice ProvisionRobustness EvaluationAdversarial attack 2020.02.10 2025.05.28 Literature Database
Adversarial Data Encryption Authors: Yingdong Hu, Liang Zhang, Wei Shan, Xiaoxiao Qin, Jing Qi, Zhenzhou Wu, Yang Yuan | Published: 2020-02-10 | Updated: 2020-02-11 PoisoningAdversarial attackCryptography 2020.02.10 2025.05.28 Literature Database
Manipulating Reinforcement Learning: Poisoning Attacks on Cost Signals Authors: Yunhan Huang, Quanyan Zhu | Published: 2020-02-07 | Updated: 2020-07-20 Q-Learning AlgorithmConvergence AnalysisAdversarial attack 2020.02.07 2025.05.28 Literature Database
On the Resilience of Biometric Authentication Systems against Random Inputs Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar | Published: 2020-01-13 | Updated: 2020-01-24 PoisoningAdversarial attackMachine Learning 2020.01.13 2025.05.28 Literature Database
Membership Inference Attacks Against Object Detection Models Authors: Yeachan Park, Myungjoo Kang | Published: 2020-01-12 | Updated: 2020-01-28 Membership InferenceAdversarial attackMachine Learning 2020.01.12 2025.05.28 Literature Database
Fast is better than free: Revisiting adversarial training Authors: Eric Wong, Leslie Rice, J. Zico Kolter | Published: 2020-01-12 Adversarial ExampleAdversarial attackDeep Learning Method 2020.01.12 2025.05.28 Literature Database