GAMIN: An Adversarial Approach to Black-Box Model Inversion Authors: Ulrich Aïvodji, Sébastien Gambs, Timon Ther | Published: 2019-09-26 PoisoningTaxonomy of AttacksGenerative Adversarial Network 2019.09.26 2025.05.28 Literature Database
COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection Authors: Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen | Published: 2019-09-20 PoisoningAdversarial ExampleAdversarial attack 2019.09.20 2025.05.28 Literature Database
Defending Against Physically Realizable Attacks on Image Classification Authors: Tong Wu, Liang Tong, Yevgeniy Vorobeychik | Published: 2019-09-20 | Updated: 2020-02-14 PoisoningTaxonomy of AttacksAdversarial attack 2019.09.20 2025.05.28 Literature Database
Adversarial Attacks and Defenses in Images, Graphs and Text: A Review Authors: Han Xu, Yao Ma, Haochen Liu, Debayan Deb, Hui Liu, Jiliang Tang, Anil K. Jain | Published: 2019-09-17 | Updated: 2019-10-09 PoisoningAdversarial ExampleAdversarial attack 2019.09.17 2025.05.28 Literature Database
They Might NOT Be Giants: Crafting Black-Box Adversarial Examples with Fewer Queries Using Particle Swarm Optimization Authors: Rayan Mosli, Matthew Wright, Bo Yuan, Yin Pan | Published: 2019-09-16 PoisoningModel RobustnessAdversarial Perturbation Techniques 2019.09.16 2025.05.28 Literature Database
Node Injection Attacks on Graphs via Reinforcement Learning Authors: Yiwei Sun, Suhang Wang, Xianfeng Tang, Tsung-Yu Hsieh, Vasant Honavar | Published: 2019-09-14 Node Injection AttackPoisoningReinforcement Learning Algorithm 2019.09.14 2025.05.28 Literature Database
Sparse and Imperceivable Adversarial Attacks Authors: Francesco Croce, Matthias Hein | Published: 2019-09-11 PoisoningAttack MethodMachine Learning Method 2019.09.11 2025.05.28 Literature Database
PDA: Progressive Data Augmentation for General Robustness of Deep Neural Networks Authors: Hang Yu, Aishan Liu, Xianglong Liu, Gengchao Li, Ping Luo, Ran Cheng, Jichen Yang, Chongzhi Zhang | Published: 2019-09-11 | Updated: 2020-02-24 PoisoningModel RobustnessAttack Method 2019.09.11 2025.05.28 Literature Database
When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures Authors: Gil Fidel, Ron Bitton, Asaf Shabtai | Published: 2019-09-08 PoisoningAdversarial ExampleAdversarial Example Detection 2019.09.08 2025.05.28 Literature Database
Spatiotemporally Constrained Action Space Attacks on Deep Reinforcement Learning Agents Authors: Xian Yeow Lee, Sambit Ghadai, Kai Liang Tan, Chinmay Hegde, Soumik Sarkar | Published: 2019-09-05 | Updated: 2019-11-19 PoisoningAttack Pattern ExtractionAdversarial Training 2019.09.05 2025.05.28 Literature Database