Learning to Disentangle Robust and Vulnerable Features for Adversarial Detection Authors: Byunggill Joe, Sung Ju Hwang, Insik Shin | Published: 2019-09-10 Adversarial ExampleAdversarial Example DetectionAdversarial Training 2019.09.10 2025.05.28 Literature Database
BOSH: An Efficient Meta Algorithm for Decision-based Attacks Authors: Zhenxin Xiao, Puyudi Yang, Yuchen Jiang, Kai-Wei Chang, Cho-Jui Hsieh | Published: 2019-09-10 | Updated: 2019-10-14 Adversarial ExampleAdversarial Example DetectionAdversarial Training 2019.09.10 2025.05.28 Literature Database
Adversarial Robustness Against the Union of Multiple Perturbation Models Authors: Pratyush Maini, Eric Wong, J. Zico Kolter | Published: 2019-09-09 | Updated: 2020-07-28 Efficient Resolution of Learning TasksImprovement of LearningAdversarial Training 2019.09.09 2025.05.28 Literature Database
Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information Authors: Yiren Zhao, Ilia Shumailov, Han Cui, Xitong Gao, Robert Mullins, Ross Anderson | Published: 2019-09-06 | Updated: 2019-11-21 Efficient Resolution of Learning TasksAttack Pattern ExtractionAdversarial Training 2019.09.06 2025.05.28 Literature Database
Spatiotemporally Constrained Action Space Attacks on Deep Reinforcement Learning Agents Authors: Xian Yeow Lee, Sambit Ghadai, Kai Liang Tan, Chinmay Hegde, Soumik Sarkar | Published: 2019-09-05 | Updated: 2019-11-19 PoisoningAttack Pattern ExtractionAdversarial Training 2019.09.05 2025.05.28 Literature Database
Optimal Attacks on Reinforcement Learning Policies Authors: Alessio Russo, Alexandre Proutiere | Published: 2019-07-31 Privacy Enhancing TechnologyAdversarial TrainingDeep Reinforcement Learning 2019.07.31 2025.05.28 Literature Database
Impact of Adversarial Examples on Deep Learning Models for Biomedical Image Segmentation Authors: Utku Ozbulak, Arnout Van Messem, Wesley De Neve | Published: 2019-07-30 Medical Image AnalysisAdversarial ExampleAdversarial Training 2019.07.30 2025.05.28 Literature Database
Are Odds Really Odd? Bypassing Statistical Detection of Adversarial Examples Authors: Hossein Hosseini, Sreeram Kannan, Radha Poovendran | Published: 2019-07-28 Taxonomy of AttacksAdversarial ExampleAdversarial Training 2019.07.28 2025.05.28 Literature Database
A cryptographic approach to black box adversarial machine learning Authors: Kevin Shi, Daniel Hsu, Allison Bishop | Published: 2019-06-07 | Updated: 2020-02-21 Security TestingAdversarial TrainingDefense Effectiveness Analysis 2019.06.07 2025.05.28 Literature Database
Adversarial Explanations for Understanding Image Classification Decisions and Improved Neural Network Robustness Authors: Walt Woods, Jack Chen, Christof Teuscher | Published: 2019-06-07 | Updated: 2019-08-06 PoisoningAdversarial ExampleAdversarial Training 2019.06.07 2025.05.28 Literature Database