The Taboo Trap: Behavioural Detection of Adversarial Samples Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2018-11-18 | Updated: 2019-11-21 Backdoor DetectionEncryption TechnologyDefense Method 2018.11.18 2025.05.28 Literature Database
Robust Website Fingerprinting Through the Cache Occupancy Channel Authors: Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom | Published: 2018-11-17 | Updated: 2019-02-21 Fingerprinting MethodAttack EvaluationDefense Method 2018.11.17 2025.05.28 Literature Database
FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning Authors: Faiq Khalid, Muhammmad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique | Published: 2018-11-04 Model Extraction AttackAttack EvaluationDefense Method 2018.11.04 2025.05.28 Literature Database
QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks Authors: Faiq Khalid, Hassan Ali, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-04 | Updated: 2020-05-14 Certified RobustnessQuantization MethodDefense Method 2018.11.04 2025.05.28 Literature Database
Adversarial Examples: Opportunities and Challenges Authors: Jiliang Zhang, Chen Li | Published: 2018-09-13 | Updated: 2019-09-23 Certified RobustnessAdversarial ExampleDefense Method 2018.09.13 2025.05.28 Literature Database
Deep Learning for Launching and Mitigating Wireless Jamming Attacks Authors: Tugba Erpek, Yalin E. Sagduyu, Yi Shi | Published: 2018-07-03 | Updated: 2018-12-13 Training Data GenerationAdversarial attackDefense Method 2018.07.03 2025.05.28 Literature Database
Delving into adversarial attacks on deep policies Authors: Jernej Kos, Dawn Song | Published: 2017-05-18 Certified RobustnessRobustnessDefense Method 2017.05.18 2025.05.28 Literature Database
Extending Defensive Distillation Authors: Nicolas Papernot, Patrick McDaniel | Published: 2017-05-15 RobustnessAdversarial ExampleDefense Method 2017.05.15 2025.05.28 Literature Database