Metric Learning for Adversarial Robustness Authors: Chengzhi Mao, Ziyuan Zhong, Junfeng Yang, Carl Vondrick, Baishakhi Ray | Published: 2019-09-03 | Updated: 2019-10-28 PoisoningImprovement of LearningVulnerability of Adversarial Examples 2019.09.03 2025.05.28 Literature Database
Universal, transferable and targeted adversarial attacks Authors: Junde Wu, Rao Fu | Published: 2019-08-29 | Updated: 2022-06-13 PoisoningAdversarial ExampleAdversarial Attack Detection 2019.08.29 2025.05.28 Literature Database
Transferring Robustness for Graph Neural Network Against Poisoning Attacks Authors: Xianfeng Tang, Yandong Li, Yiwei Sun, Huaxiu Yao, Prasenjit Mitra, Suhang Wang | Published: 2019-08-20 | Updated: 2020-02-26 PoisoningRobustness Improvement MethodContent Specialized for Toxicity Attacks 2019.08.20 2025.05.28 Literature Database
Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses Authors: Xiao Wang, Siyue Wang, Pin-Yu Chen, Yanzhi Wang, Brian Kulis, Xue Lin, Peter Chin | Published: 2019-08-20 PoisoningRobustness Improvement MethodAdversarial Attack Methods 2019.08.20 2025.05.28 Literature Database
On Defending Against Label Flipping Attacks on Malware Detection Systems Authors: Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti | Published: 2019-08-13 | Updated: 2020-06-16 PoisoningAdversarial Attack MethodsComputational Complexity 2019.08.13 2025.05.28 Literature Database
On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method Authors: Pu Zhao, Sijia Liu, Pin-Yu Chen, Nghia Hoang, Kaidi Xu, Bhavya Kailkhura, Xue Lin | Published: 2019-07-26 | Updated: 2019-12-04 PoisoningEffective Perturbation MethodsAdversarial Transferability 2019.07.26 2025.05.28 Literature Database
Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics Authors: Yuxin Ma, Tiankai Xie, Jundong Li, Ross Maciejewski | Published: 2019-07-17 | Updated: 2019-10-03 Backdoor AttackPoisoningAdversarial Attack Methods 2019.07.17 2025.05.28 Literature Database
Adversarial Security Attacks and Perturbations on Machine Learning and Deep Learning Methods Authors: Arif Siddiqi | Published: 2019-07-17 PoisoningAdversarial ExampleAdversarial Attack Methods 2019.07.17 2025.05.28 Literature Database
Helen: Maliciously Secure Coopetitive Learning for Linear Models Authors: Wenting Zheng, Raluca Ada Popa, Joseph E. Gonzalez, Ion Stoica | Published: 2019-07-16 | Updated: 2019-09-03 MPC AlgorithmPoisoningEncryption Technology 2019.07.16 2025.05.28 Literature Database
Stateful Detection of Black-Box Adversarial Attacks Authors: Steven Chen, Nicholas Carlini, David Wagner | Published: 2019-07-12 PoisoningAttack DetectionAdversarial attack 2019.07.12 2025.05.28 Literature Database