Uncovering the Connections Between Adversarial Transferability and Knowledge Transferability Authors: Kaizhao Liang, Jacky Y. Zhang, Boxin Wang, Zhuolin Yang, Oluwasanmi Koyejo, Bo Li | Published: 2020-06-25 | Updated: 2021-07-08 PoisoningAdversarial TransferabilityKnowledge Transferability 2020.06.25 2025.05.28 Literature Database
Renofeation: A Simple Transfer Learning Method for Improved Adversarial Robustness Authors: Ting-Wu Chin, Cha Zhang, Diana Marculescu | Published: 2020-02-07 | Updated: 2021-04-28 Robustness Improvement MethodAdversarial ExampleAdversarial Transferability 2020.02.07 2025.05.28 Literature Database
Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels Authors: Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus | Published: 2020-02-05 | Updated: 2020-02-13 Adversarial Perturbation TechniquesAdversarial TransferabilityCommunication Loss 2020.02.05 2025.05.28 Literature Database
Minimax Defense against Gradient-based Adversarial Attacks Authors: Blerta Lindqvist, Rauf Izmailov | Published: 2020-02-04 Adversarial Perturbation TechniquesAdversarial TransferabilityEffectiveness Analysis of Defense Methods 2020.02.04 2025.05.28 Literature Database
A4 : Evading Learning-based Adblockers Authors: Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq | Published: 2020-01-29 Adversarial Perturbation TechniquesAdversarial TransferabilityMachine Learning Technology 2020.01.29 2025.05.28 Literature Database
A Survey of Game Theoretic Approaches for Adversarial Machine Learning in Cybersecurity Tasks Authors: Prithviraj Dasgupta, Joseph B. Collins | Published: 2019-12-04 Data GenerationVulnerability of Adversarial ExamplesAdversarial Transferability 2019.12.04 2025.05.28 Literature Database
Cross-Representation Transferability of Adversarial Attacks: From Spectrograms to Audio Waveforms Authors: Karl Michel Koerich, Mohammad Esmaeilpour, Sajjad Abdoli, Alceu de Souza Britto Jr., Alessandro Lameiras Koerich | Published: 2019-10-22 | Updated: 2020-07-29 Adversarial LearningPerformance EvaluationAdversarial Transferability 2019.10.22 2025.05.28 Literature Database
Adversarial Example Detection by Classification for Deep Speech Recognition Authors: Saeid Samizade, Zheng-Hua Tan, Chao Shen, Xiaohong Guan | Published: 2019-10-22 Adversarial LearningAdversarial TransferabilityMalfunction of Voice Assistants 2019.10.22 2025.05.28 Literature Database
On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method Authors: Pu Zhao, Sijia Liu, Pin-Yu Chen, Nghia Hoang, Kaidi Xu, Bhavya Kailkhura, Xue Lin | Published: 2019-07-26 | Updated: 2019-12-04 PoisoningEffective Perturbation MethodsAdversarial Transferability 2019.07.26 2025.05.28 Literature Database
Semisupervised Adversarial Neural Networks for Cyber Security Transfer Learning Authors: Casey Kneale, Kolia Sadeghi | Published: 2019-07-25 Training MethodAdversarial ExampleAdversarial Transferability 2019.07.25 2025.05.28 Literature Database