Certified Defenses for Adversarial Patches Authors: Ping-Yeh Chiang, Renkun Ni, Ahmed Abdelkader, Chen Zhu, Christoph Studer, Tom Goldstein | Published: 2020-03-14 | Updated: 2020-09-25 RobustnessVulnerability Attack MethodDefense Method 2020.03.14 2025.05.28 Literature Database
Undersensitivity in Neural Reading Comprehension Authors: Johannes Welbl, Pasquale Minervini, Max Bartolo, Pontus Stenetorp, Sebastian Riedel | Published: 2020-02-15 Training MethodVulnerability Attack MethodDefense Method 2020.02.15 2025.05.28 Literature Database
ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors Authors: Ivan Homoliak, Petr Hanacek | Published: 2019-10-23 Modification of Network TrafficTaxonomy of AttacksVulnerability Attack Method 2019.10.23 2025.05.28 Literature Database