URET: Universal Robustness Evaluation Toolkit (for Evasion) Authors: Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy, Masha Zorin | Published: 2023-08-03 Data GenerationAdversarial ExampleAdversarial attack 2023.08.03 2025.05.28 Literature Database
Isolation and Induction: Training Robust Deep Neural Networks against Model Stealing Attacks Authors: Jun Guo, Aishan Liu, Xingyu Zheng, Siyuan Liang, Yisong Xiao, Yichao Wu, Xianglong Liu | Published: 2023-08-02 | Updated: 2023-08-03 Adversarial ExampleAdversarial attackWatermark Robustness 2023.08.02 2025.05.28 Literature Database
Robust Linear Regression: Phase-Transitions and Precise Tradeoffs for General Norms Authors: Elvis Dohmatob, Meyer Scetbon | Published: 2023-08-01 Adversarial attackOptimization MethodsLinear Model 2023.08.01 2025.05.28 Literature Database
Doubly Robust Instance-Reweighted Adversarial Training Authors: Daouda Sow, Sen Lin, Zhangyang Wang, Yingbin Liang | Published: 2023-08-01 Adversarial attackOptimization MethodsDeep Learning Method 2023.08.01 2025.05.28 Literature Database
A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks Authors: Khushnaseeb Roshan, Aasim Zafar, Shiekh Burhan Ul Haque | Published: 2023-07-31 Data PreprocessingAdversarial attackDeep Learning Method 2023.07.31 2025.05.28 Literature Database
On Neural Network approximation of ideal adversarial attack and convergence of adversarial training Authors: Rajdeep Haldar, Qifan Song | Published: 2023-07-30 Convergence PropertyAdversarial attackOptimization Methods 2023.07.30 2025.05.28 Literature Database
Adversarial Learning in Real-World Fraud Detection: Challenges and Perspectives Authors: Danele Lunghi, Alkis Simitsis, Olivier Caelen, Gianluca Bontempi | Published: 2023-07-03 Adversarial ExampleAdversarial attackThreat modeling 2023.07.03 2025.05.28 Literature Database
Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks Authors: Pranav Dahiya, Ilia Shumailov, Ross Anderson | Published: 2023-06-24 | Updated: 2024-02-10 Algorithm DesignAdversarial attackStatistical Testing 2023.06.24 2025.05.28 Literature Database
Boosting Model Inversion Attacks with Adversarial Examples Authors: Shuai Zhou, Tianqing Zhu, Dayong Ye, Xin Yu, Wanlei Zhou | Published: 2023-06-24 PoisoningAdversarial ExampleAdversarial attack 2023.06.24 2025.05.28 Literature Database
Creating Valid Adversarial Examples of Malware Authors: Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia | Published: 2023-06-23 Malware ClassificationMalware Detection MethodAdversarial attack 2023.06.23 2025.05.28 Literature Database