COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection Authors: Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen | Published: 2019-09-20 PoisoningAdversarial ExampleAdversarial attack 2019.09.20 2025.05.28 Literature Database
Defending Against Physically Realizable Attacks on Image Classification Authors: Tong Wu, Liang Tong, Yevgeniy Vorobeychik | Published: 2019-09-20 | Updated: 2020-02-14 PoisoningTaxonomy of AttacksAdversarial attack 2019.09.20 2025.05.28 Literature Database
Absum: Simple Regularization Method for Reducing Structural Sensitivity of Convolutional Neural Networks Authors: Sekitoshi Kanai, Yasutoshi Ida, Yasuhiro Fujiwara, Masanori Yamada, Shuichi Adachi | Published: 2019-09-19 Experimental ValidationAdversarial ExampleAdversarial attack 2019.09.19 2025.05.28 Literature Database
Adversarial Attacks and Defenses in Images, Graphs and Text: A Review Authors: Han Xu, Yao Ma, Haochen Liu, Debayan Deb, Hui Liu, Jiliang Tang, Anil K. Jain | Published: 2019-09-17 | Updated: 2019-10-09 PoisoningAdversarial ExampleAdversarial attack 2019.09.17 2025.05.28 Literature Database
Exploring the Robustness of NMT Systems to Nonsensical Inputs Authors: Akshay Chaturvedi, Abijith KP, Utpal Garain | Published: 2019-08-03 | Updated: 2020-02-28 BLEU Score EvaluationAdversarial attackMachine Learning 2019.08.03 2025.05.28 Literature Database
Graph Interpolating Activation Improves Both Natural and Robust Accuracies in Data-Efficient Deep Learning Authors: Bao Wang, Stanley J. Osher | Published: 2019-07-16 Adversarial attackDeep Learning MethodWeight Update Method 2019.07.16 2025.05.28 Literature Database
Recovery Guarantees for Compressible Signals with Adversarial Noise Authors: Jasjeet Dhaliwal, Kyle Hambrook | Published: 2019-07-15 | Updated: 2019-08-07 Algorithm DesignAdversarial attackDeep Learning Method 2019.07.15 2025.05.28 Literature Database
Measuring the Transferability of Adversarial Examples Authors: Deyan Petrov, Timothy M. Hospedales | Published: 2019-07-14 Adversarial ExampleAdversarial attackDeep Learning Method 2019.07.14 2025.05.28 Literature Database
Stateful Detection of Black-Box Adversarial Attacks Authors: Steven Chen, Nicholas Carlini, David Wagner | Published: 2019-07-12 PoisoningAttack DetectionAdversarial attack 2019.07.12 2025.05.28 Literature Database
Adversarial Objects Against LiDAR-Based Autonomous Driving Systems Authors: Yulong Cao, Chaowei Xiao, Dawei Yang, Jing Fang, Ruigang Yang, Mingyan Liu, Bo Li | Published: 2019-07-11 Adversarial ExampleAdversarial attackDeep Learning Method 2019.07.11 2025.05.28 Literature Database