Adversarial Examples in Modern Machine Learning: A Review Authors: Rey Reza Wiyatno, Anqi Xu, Ousmane Dia, Archy de Berker | Published: 2019-11-13 | Updated: 2019-11-15 PoisoningAdversarial ExampleAdversarial Attack Methods 2019.11.13 2025.05.28 Literature Database
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models Authors: Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, Ting Wang | Published: 2019-11-05 | Updated: 2020-11-21 PoisoningAttack MethodAdversarial Example 2019.11.05 2025.05.28 Literature Database
Online Robustness Training for Deep Reinforcement Learning Authors: Marc Fischer, Matthew Mirman, Steven Stalder, Martin Vechev | Published: 2019-11-03 | Updated: 2019-11-22 PoisoningImprovement of LearningKnowledge Distillation 2019.11.03 2025.05.28 Literature Database
Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization Authors: Rana Abou Khamis, Omair Shafiq, Ashraf Matrawy | Published: 2019-10-30 PoisoningAttack MethodAdversarial Example 2019.10.30 2025.05.28 Literature Database
Secure and Efficient Federated Transfer Learning Authors: Shreya Sharma, Xing Chaoping, Yang Liu, Yan Kang | Published: 2019-10-29 | Updated: 2019-10-30 Privacy ManagementPoisoningDeep Transfer Learning 2019.10.29 2025.05.28 Literature Database
Label Smoothing and Logit Squeezing: A Replacement for Adversarial Training? Authors: Ali Shafahi, Amin Ghiasi, Furong Huang, Tom Goldstein | Published: 2019-10-25 PoisoningImprovement of LearningAdversarial Example 2019.10.25 2025.05.28 Literature Database
Abnormal Client Behavior Detection in Federated Learning Authors: Suyi Li, Yong Cheng, Yang Liu, Wei Wang, Tianjian Chen | Published: 2019-10-22 | Updated: 2019-12-06 Client Contribution AssessmentPoisoningAnomaly Detection Method 2019.10.22 2025.05.28 Literature Database
Edge Dithering for Robust Adaptive Graph Convolutional Networks Authors: Vassilis N. Ioannidis, Georgios B. Giannakis | Published: 2019-10-21 Graph Neural NetworkPoisoningModel Architecture 2019.10.21 2025.05.28 Literature Database
Recovering Localized Adversarial Attacks Authors: Jan Philip Göpfert, Heiko Wersing, Barbara Hammer | Published: 2019-10-21 PoisoningAdversarial LearningFeature Importance Analysis 2019.10.21 2025.05.28 Literature Database
Enforcing Linearity in DNN succours Robustness and Adversarial Image Generation Authors: Anindya Sarkar, Nikhil Kumar Gupta, Raghu Iyengar | Published: 2019-10-17 | Updated: 2019-10-21 PoisoningAdversarial LearningAdversarial Example 2019.10.17 2025.05.28 Literature Database