Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics Authors: Yi Xiang Marcus Tan, Alfonso Iacovazzi, Ivan Homoliak, Yuval Elovici, Alexander Binder | Published: 2019-05-28 | Updated: 2019-11-27 PoisoningModel EvaluationAdversarial Learning 2019.05.28 2025.05.28 Literature Database
Improving the Robustness of Deep Neural Networks via Adversarial Training with Triplet Loss Authors: Pengcheng Li, Jinfeng Yi, Bowen Zhou, Lijun Zhang | Published: 2019-05-28 PoisoningAdversarial ExampleAdversarial Learning 2019.05.28 2025.05.28 Literature Database
GAT: Generative Adversarial Training for Adversarial Example Detection and Robust Classification Authors: Xuwang Yin, Soheil Kolouri, Gustavo K. Rohde | Published: 2019-05-27 | Updated: 2022-10-01 Binary ClassifierPoisoningAdversarial Example Detection 2019.05.27 2025.05.28 Literature Database
Non-Determinism in Neural Networks for Adversarial Robustness Authors: Daanish Ali Khan, Linhong Li, Ninghao Sha, Zhuoran Liu, Abelino Jimenez, Bhiksha Raj, Rita Singh | Published: 2019-05-26 PoisoningAdversarial ExampleAdversarial Example Detection 2019.05.26 2025.05.28 Literature Database
A Direct Approach to Robust Deep Learning Using Adversarial Networks Authors: Huaxia Wang, Chun-Nam Yu | Published: 2019-05-23 PoisoningAdversarial ExampleGenerative Adversarial Network 2019.05.23 2025.05.28 Literature Database
Deep Reinforcement Learning for Detecting Malicious Websites Authors: Moitrayee Chatterjee, Akbar Siami Namin | Published: 2019-05-22 PhishingPoisoningReinforcement Learning Algorithm 2019.05.22 2025.05.28 Literature Database
Learning to Confuse: Generating Training Time Adversarial Data with Auto-Encoder Authors: Ji Feng, Qi-Zhi Cai, Zhi-Hua Zhou | Published: 2019-05-22 PoisoningEffective Perturbation MethodsMachine Learning Algorithm 2019.05.22 2025.05.28 Literature Database
POPQORN: Quantifying Robustness of Recurrent Neural Networks Authors: Ching-Yun Ko, Zhaoyang Lyu, Tsui-Wei Weng, Luca Daniel, Ngai Wong, Dahua Lin | Published: 2019-05-17 PoisoningModel EvaluationPerformance Evaluation Method 2019.05.17 2025.05.28 Literature Database
Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization Authors: Seungyong Moon, Gaon An, Hyun Oh Song | Published: 2019-05-16 | Updated: 2022-10-18 Query Generation MethodPoisoningOptimization Methods 2019.05.16 2025.05.28 Literature Database
Data Poisoning Attacks on Stochastic Bandits Authors: Fang Liu, Ness Shroff | Published: 2019-05-16 AlgorithmPoisoningAttack Chain Analysis 2019.05.16 2025.05.28 Literature Database