A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines Authors: Rui Zhang, Quanyan Zhu | Published: 2018-02-07 Multi-Objective OptimizationAdversarial attackMachine Learning Method 2018.02.07 2025.05.28 Literature Database
Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach Authors: Tsui-Wei Weng, Huan Zhang, Pin-Yu Chen, Jinfeng Yi, Dong Su, Yupeng Gao, Cho-Jui Hsieh, Luca Daniel | Published: 2018-01-31 Certified RobustnessRobustness EvaluationAdversarial attack 2018.01.31 2025.05.28 Literature Database
Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning Authors: Hyrum S. Anderson, Anant Kharkar, Bobby Filar, David Evans, Phil Roth | Published: 2018-01-26 | Updated: 2018-01-30 Reinforcement Learning MethodAdversarial attackMachine Learning Method 2018.01.26 2025.05.28 Literature Database
Sparsity-based Defense against Adversarial Attacks on Linear Classifiers Authors: Zhinus Marzi, Soorya Gopalakrishnan, Upamanyu Madhow, Ramtin Pedarsani | Published: 2018-01-15 | Updated: 2018-06-19 Sparsity DefenseAdversarial LearningAdversarial attack 2018.01.15 2025.05.28 Literature Database
LatentPoison – Adversarial Attacks On The Latent Space Authors: Antonia Creswell, Anil A. Bharath, Biswa Sengupta | Published: 2017-11-08 PoisoningCertified RobustnessAdversarial attack 2017.11.08 2025.05.28 Literature Database
Intriguing Properties of Adversarial Examples Authors: Ekin D. Cubuk, Barret Zoph, Samuel S. Schoenholz, Quoc V. Le | Published: 2017-11-08 Adversarial ExampleAdversarial LearningAdversarial attack 2017.11.08 2025.05.28 Literature Database