Encryption Inspired Adversarial Defense for Visual Classification Authors: MaungMaung AprilPyone, Hitoshi Kiya | Published: 2020-05-16 Machine Learning AlgorithmMachine Learning MethodDefense Effectiveness Analysis 2020.05.16 2025.05.28 Literature Database
DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses Authors: Yaxin Li, Wei Jin, Han Xu, Jiliang Tang | Published: 2020-05-13 AlgorithmExplainability of Graph Machine LearningDefense Effectiveness Analysis 2020.05.13 2025.05.28 Literature Database
Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability Authors: Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna | Published: 2020-05-01 | Updated: 2021-03-14 Backdoor AttackPoisoningDefense Effectiveness Analysis 2020.05.01 2025.05.28 Literature Database
Minority Reports Defense: Defending Against Adversarial Patches Authors: Michael McCoyd, Won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang, Jason Xinyu Liu, David Wagner | Published: 2020-04-28 Attack DetectionAdversarial Attack DetectionDefense Effectiveness Analysis 2020.04.28 2025.05.28 Literature Database
A cryptographic approach to black box adversarial machine learning Authors: Kevin Shi, Daniel Hsu, Allison Bishop | Published: 2019-06-07 | Updated: 2020-02-21 Security TestingAdversarial TrainingDefense Effectiveness Analysis 2019.06.07 2025.05.28 Literature Database
Combatting Adversarial Attacks through Denoising and Dimensionality Reduction: A Cascaded Autoencoder Approach Authors: Rajeev Sahay, Rehana Mahfuz, Aly El Gamal | Published: 2018-12-07 Attack MethodAdversarial Example DetectionDefense Effectiveness Analysis 2018.12.07 2025.05.28 Literature Database
Adversarial Attacks, Regression, and Numerical Stability Regularization Authors: Andre T. Nguyen, Edward Raff | Published: 2018-12-07 Robust RegressionAdversarial ExampleDefense Effectiveness Analysis 2018.12.07 2025.05.28 Literature Database
Enhancing Robustness of Machine Learning Systems via Data Transformations Authors: Arjun Nitin Bhagoji, Daniel Cullina, Chawin Sitawarin, Prateek Mittal | Published: 2017-04-09 | Updated: 2017-11-29 Certified RobustnessModel Extraction AttackDefense Effectiveness Analysis 2017.04.09 2025.05.28 Literature Database