Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks Authors: David J. Miller, Zhen Xiang, George Kesidis | Published: 2019-04-12 | Updated: 2019-12-02 Backdoor AttackPoisoningAdversarial Attack Detection 2019.04.12 2025.05.28 Literature Database
Disentangled Deep Autoencoding Regularization for Robust Image Classification Authors: Zhenyu Duan, Martin Renqiang Min, Li Erran Li, Mingbo Cai, Yi Xu, Bingbing Ni | Published: 2019-02-27 Data Augmentation TechniquesBackdoor AttackRobustness Improvement Method 2019.02.27 2025.05.28 Literature Database
Design of intentional backdoors in sequential models Authors: Zhaoyuan Yang, Naresh Iyer, Johan Reimann, Nurali Virani | Published: 2019-02-26 Backdoor AttackReinforcement Learning AttackAdversarial Learning 2019.02.26 2025.05.28 Literature Database
Adversarial attacks hidden in plain sight Authors: Jan Philip Göpfert, André Artelt, Heiko Wersing, Barbara Hammer | Published: 2019-02-25 | Updated: 2020-04-26 Backdoor AttackRobustness EvaluationAdversarial Learning 2019.02.25 2025.05.28 Literature Database
Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence Authors: Yi Han, David Hubczenko, Paul Montague, Olivier De Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah Erfani | Published: 2019-02-25 | Updated: 2020-08-17 Backdoor AttackReinforcement Learning AttackAdversarial Learning 2019.02.25 2025.05.28 Literature Database
Robust Audio Adversarial Example for a Physical Attack Authors: Hiromu Yakura, Jun Sakuma | Published: 2018-10-28 | Updated: 2019-08-19 Backdoor AttackSignal Processing TechniquesAdversarial Example 2018.10.28 2025.05.28 Literature Database
Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques Authors: Dorjan Hitaj, Luigi V. Mancini | Published: 2018-09-03 Backdoor AttackDetection of Model Extraction AttacksTransparency and Verification 2018.09.03 2025.05.28 Literature Database
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation Authors: Cong Liao, Haoti Zhong, Anna Squicciarini, Sencun Zhu, David Miller | Published: 2018-08-30 Backdoor AttackBackdoor Attack MitigationRobustness Analysis 2018.08.30 2025.05.28 Literature Database
Adversarial Robustness Toolbox v1.0.0 Authors: Maria-Irina Nicolae, Mathieu Sinn, Minh Ngoc Tran, Beat Buesser, Ambrish Rawat, Martin Wistuba, Valentina Zantedeschi, Nathalie Baracaldo, Bryant Chen, Heiko Ludwig, Ian M. Molloy, Ben Edwards | Published: 2018-07-03 | Updated: 2019-11-15 Backdoor AttackAttack EvaluationAdversarial Learning 2018.07.03 2025.05.28 Literature Database
Adversarial Attack on Graph Structured Data Authors: Hanjun Dai, Hui Li, Tian Tian, Xin Huang, Lin Wang, Jun Zhu, Le Song | Published: 2018-06-06 Graph Representation LearningBackdoor AttackCertified Robustness 2018.06.06 2025.05.28 Literature Database