Robustness for Non-Parametric Classification: A Generic Attack and Defense Authors: Yao-Yuan Yang, Cyrus Rashtchian, Yizhen Wang, Kamalika Chaudhuri | Published: 2019-06-07 | Updated: 2020-02-24 Robust ClassificationAdversarial LearningDefense Method 2019.06.07 2025.05.28 Literature Database
On Configurable Defense against Adversarial Example Attacks Authors: Bo Luo, Min Li, Yu Li, Qiang Xu | Published: 2018-12-06 Adversarial ExampleAdversarial LearningDefense Method 2018.12.06 2025.05.28 Literature Database
Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples Authors: Huangyi Ge, Sze Yiu Chau, Bruno Ribeiro, Ninghui Li | Published: 2018-12-05 | Updated: 2020-01-20 Certified RobustnessAdversarial ExampleDefense Method 2018.12.05 2025.05.28 Literature Database
Adversarial Machine Learning And Speech Emotion Recognition: Utilizing Generative Adversarial Networks For Robustness Authors: Siddique Latif, Rajib Rana, Junaid Qadir | Published: 2018-11-28 | Updated: 2018-12-30 Certified RobustnessRobustness ImprovementDefense Method 2018.11.28 2025.05.28 Literature Database
Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition Authors: Jenn-Bing Ong, Wee-Keong Ng, C. -C. Jay Kuo | Published: 2018-11-20 | Updated: 2018-12-11 Robust ClassificationAdversarial LearningDefense Method 2018.11.20 2025.05.28 Literature Database
Lightweight Lipschitz Margin Training for Certified Defense against Adversarial Examples Authors: Hajime Ono, Tsubasa Takahashi, Kazuya Kakizaki | Published: 2018-11-20 Robustness ImprovementAdversarial LearningDefense Method 2018.11.20 2025.05.28 Literature Database
The Taboo Trap: Behavioural Detection of Adversarial Samples Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2018-11-18 | Updated: 2019-11-21 Backdoor DetectionEncryption TechnologyDefense Method 2018.11.18 2025.05.28 Literature Database
Robust Website Fingerprinting Through the Cache Occupancy Channel Authors: Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom | Published: 2018-11-17 | Updated: 2019-02-21 Fingerprinting MethodAttack EvaluationDefense Method 2018.11.17 2025.05.28 Literature Database
FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning Authors: Faiq Khalid, Muhammmad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique | Published: 2018-11-04 Model Extraction AttackAttack EvaluationDefense Method 2018.11.04 2025.05.28 Literature Database
QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks Authors: Faiq Khalid, Hassan Ali, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-04 | Updated: 2020-05-14 Certified RobustnessQuantization MethodDefense Method 2018.11.04 2025.05.28 Literature Database