GANG-MAM: GAN based enGine for Modifying Android Malware Authors: Renjith G, Sonia Laudanna, Aji S, Corrado Aaron Visaggio, Vinod P | Published: 2021-09-27 Software SecurityMalware Detection MethodAdversarial attack 2021.09.27 2025.05.28 Literature Database
Adversarial Transfer Attacks With Unknown Data and Class Overlap Authors: Luke E. Richards, André Nguyen, Ryan Capps, Steven Forsythe, Cynthia Matuszek, Edward Raff | Published: 2021-09-23 | Updated: 2021-09-24 PoisoningRobustnessAdversarial attack 2021.09.23 2025.05.28 Literature Database
Attacks on Visualization-Based Malware Detection: Balancing Effectiveness and Executability Authors: Hadjer Benkraouda, Jingyu Qian, Hung Quoc Tran, Berkay Kaplan | Published: 2021-09-21 Malware Detection MethodAdversarial ExampleAdversarial attack 2021.09.21 2025.05.28 Literature Database
Towards Resilient Artificial Intelligence: Survey and Research Issues Authors: Oliver Eigner, Sebastian Eresheim, Peter Kieseberg, Lukas Daniel Klausner, Martin Pirker, Torsten Priebe, Simon Tjoa, Fiammetta Marulli, Francesco Mercaldo | Published: 2021-09-18 RobustnessFuture ResearchAdversarial attack 2021.09.18 2025.05.28 Literature Database
EVAGAN: Evasion Generative Adversarial Network for Low Data Regimes Authors: Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Husnain Rafiq | Published: 2021-09-14 | Updated: 2022-08-06 Data GenerationPerformance EvaluationAdversarial attack 2021.09.14 2025.05.28 Literature Database
Dodging Attack Using Carefully Crafted Natural Makeup Authors: Nitzan Guetta, Asaf Shabtai, Inderjeet Singh, Satoru Momiyama, Yuval Elovici | Published: 2021-09-14 Makeup AttackAdversarial attackFace Recognition System 2021.09.14 2025.05.28 Literature Database
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers Authors: Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek | Published: 2021-07-30 | Updated: 2022-03-06 Backdoor AttackAdversarial attackSecurity of Voice Recognition Systems 2021.07.30 2025.05.28 Literature Database
When and How to Fool Explainable Models (and Humans) with Adversarial Examples Authors: Jon Vadillo, Roberto Santana, Jose A. Lozano | Published: 2021-07-05 | Updated: 2023-07-07 Model InterpretabilityAdversarial ExampleAdversarial attack 2021.07.05 2025.05.28 Literature Database
Robust Stochastic Linear Contextual Bandits Under Adversarial Attacks Authors: Qin Ding, Cho-Jui Hsieh, James Sharpnack | Published: 2021-06-05 | Updated: 2023-01-30 Data Contamination DetectionAdversarial attackVulnerability Assessment Method 2021.06.05 2025.05.28 Literature Database
Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks Authors: Ramy Maarouf, Danish Sattar, Ashraf Matrawy | Published: 2021-05-30 PoisoningAdversarial attackVulnerability Assessment Method 2021.05.30 2025.05.28 Literature Database