Dissecting Malware in the Wild Authors: Hamish Spencer, Wei Wang, Ruoxi Sun, Minhui Xue | Published: 2021-11-28 | Updated: 2021-12-04 Backdoor AttackMalware Detection MethodAdversarial attack 2021.11.28 2025.05.28 Literature Database
The Geometry of Adversarial Training in Binary Classification Authors: Leon Bungert, Nicolás García Trillos, Ryan Murray | Published: 2021-11-26 | Updated: 2022-08-01 Adversarial attackRegularizationNonlocal Variational Regularization 2021.11.26 2025.05.28 Literature Database
Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the Age of AI-NIDS Authors: Christian Schroeder de Witt, Yongchao Huang, Philip H. S. Torr, Martin Strohmeier | Published: 2021-11-23 Reinforcement LearningAdversarial attackDeep Reinforcement Learning 2021.11.23 2025.05.28 Literature Database
A Comparison of State-of-the-Art Techniques for Generating Adversarial Malware Binaries Authors: Prithviraj Dasgupta, Zachariah Osman | Published: 2021-11-22 Malware Detection MethodAdversarial attackMalware Detection with Limited Samples 2021.11.22 2025.05.28 Literature Database
Evaluating Adversarial Attacks on ImageNet: A Reality Check on Misclassification Classes Authors: Utku Ozbulak, Maura Pintor, Arnout Van Messem, Wesley De Neve | Published: 2021-11-22 PoisoningAdversarial ExampleAdversarial attack 2021.11.22 2025.05.28 Literature Database
Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Model Authors: Alon Zolfi, Shai Avidan, Yuval Elovici, Asaf Shabtai | Published: 2021-11-21 | Updated: 2022-09-07 Impact of GeneralizationAdversarial attackFace Recognition System 2021.11.21 2025.05.28 Literature Database
Fooling Adversarial Training with Inducing Noise Authors: Zhirui Wang, Yifei Wang, Yisen Wang | Published: 2021-11-19 Training Data GenerationPoisoningAdversarial attack 2021.11.19 2025.05.28 Literature Database
A Review of Adversarial Attack and Defense for Classification Methods Authors: Yao Li, Minhao Cheng, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-11-18 Adversarial ExampleAdversarial attackDefense Mechanism 2021.11.18 2025.05.28 Literature Database
Enhanced Membership Inference Attacks against Machine Learning Models Authors: Jiayuan Ye, Aadyaa Maddi, Sasi Kumar Murakonda, Vincent Bindschaedler, Reza Shokri | Published: 2021-11-18 | Updated: 2022-09-13 PoisoningMembership InferenceAdversarial attack 2021.11.18 2025.05.28 Literature Database
Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks Authors: Kaleel Mahmood, Rigel Mahmood, Ethan Rathbun, Marten van Dijk | Published: 2021-09-29 Backdoor AttackPoisoningAdversarial attack 2021.09.29 2025.05.28 Literature Database