Poisoning Attacks with Generative Adversarial Nets Authors: Luis Muñoz-González, Bjarne Pfitzner, Matteo Russo, Javier Carnerero-Cano, Emil C. Lupu | Published: 2019-06-18 | Updated: 2019-09-25 Backdoor AttackAttack MethodGenerative Adversarial Network 2019.06.18 2025.05.28 Literature Database
On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks Authors: Masoumeh Shafieinejad, Jiaqi Wang, Nils Lukas, Xinda Li, Florian Kerschbaum | Published: 2019-06-18 | Updated: 2019-11-26 DNN IP Protection MethodBackdoor AttackAttack Method 2019.06.18 2025.05.28 Literature Database
Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and The Way Forward Authors: Adnan Qayyum, Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-05-29 Backdoor AttackAdversarial ExampleAdversarial Attack Methods 2019.05.29 2025.05.28 Literature Database
An Investigation of Data Poisoning Defenses for Online Learning Authors: Yizhen Wang, Somesh Jha, Kamalika Chaudhuri | Published: 2019-05-28 | Updated: 2020-02-19 Backdoor AttackPoisoningTaxonomy of Attacks 2019.05.28 2025.05.28 Literature Database
Privacy Risks of Securing Machine Learning Models against Adversarial Examples Authors: Liwei Song, Reza Shokri, Prateek Mittal | Published: 2019-05-24 | Updated: 2019-08-25 Backdoor AttackMembership InferenceAdversarial Example 2019.05.24 2025.05.28 Literature Database
Transferable Clean-Label Poisoning Attacks on Deep Neural Nets Authors: Chen Zhu, W. Ronny Huang, Ali Shafahi, Hengduo Li, Gavin Taylor, Christoph Studer, Tom Goldstein | Published: 2019-05-15 | Updated: 2019-05-16 Backdoor AttackPoisoningAttack Type 2019.05.15 2025.05.28 Literature Database
A Robust Approach for Securing Audio Classification Against Adversarial Attacks Authors: Mohammad Esmaeilpour, Patrick Cardinal, Alessandro Lameiras Koerich | Published: 2019-04-24 | Updated: 2019-11-25 Backdoor AttackAdversarial ExampleAdversarial Attack Methods 2019.04.24 2025.05.28 Literature Database
Gotta Catch ‘Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks Authors: Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao | Published: 2019-04-18 | Updated: 2020-09-28 Trapdoor DefenseBackdoor AttackAdversarial Transferability 2019.04.18 2025.05.28 Literature Database
Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks Authors: David J. Miller, Zhen Xiang, George Kesidis | Published: 2019-04-12 | Updated: 2019-12-02 Backdoor AttackPoisoningAdversarial Attack Detection 2019.04.12 2025.05.28 Literature Database
Disentangled Deep Autoencoding Regularization for Robust Image Classification Authors: Zhenyu Duan, Martin Renqiang Min, Li Erran Li, Mingbo Cai, Yi Xu, Bingbing Ni | Published: 2019-02-27 Data Augmentation TechniquesBackdoor AttackRobustness Improvement Method 2019.02.27 2025.05.28 Literature Database