A Direct Approach to Robust Deep Learning Using Adversarial Networks Authors: Huaxia Wang, Chun-Nam Yu | Published: 2019-05-23 PoisoningAdversarial ExampleGenerative Adversarial Network 2019.05.23 2025.05.28 Literature Database
Deep Reinforcement Learning for Detecting Malicious Websites Authors: Moitrayee Chatterjee, Akbar Siami Namin | Published: 2019-05-22 PhishingPoisoningReinforcement Learning Algorithm 2019.05.22 2025.05.28 Literature Database
Learning to Confuse: Generating Training Time Adversarial Data with Auto-Encoder Authors: Ji Feng, Qi-Zhi Cai, Zhi-Hua Zhou | Published: 2019-05-22 PoisoningEffective Perturbation MethodsMachine Learning Algorithm 2019.05.22 2025.05.28 Literature Database
POPQORN: Quantifying Robustness of Recurrent Neural Networks Authors: Ching-Yun Ko, Zhaoyang Lyu, Tsui-Wei Weng, Luca Daniel, Ngai Wong, Dahua Lin | Published: 2019-05-17 PoisoningModel EvaluationPerformance Evaluation Method 2019.05.17 2025.05.28 Literature Database
Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization Authors: Seungyong Moon, Gaon An, Hyun Oh Song | Published: 2019-05-16 | Updated: 2022-10-18 Query Generation MethodPoisoningOptimization Methods 2019.05.16 2025.05.28 Literature Database
Data Poisoning Attacks on Stochastic Bandits Authors: Fang Liu, Ness Shroff | Published: 2019-05-16 AlgorithmPoisoningAttack Chain Analysis 2019.05.16 2025.05.28 Literature Database
On Norm-Agnostic Robustness of Adversarial Training Authors: Bai Li, Changyou Chen, Wenlin Wang, Lawrence Carin | Published: 2019-05-15 PoisoningAdversarial ExampleAdversarial Training 2019.05.15 2025.05.28 Literature Database
Transferable Clean-Label Poisoning Attacks on Deep Neural Nets Authors: Chen Zhu, W. Ronny Huang, Ali Shafahi, Hengduo Li, Gavin Taylor, Christoph Studer, Tom Goldstein | Published: 2019-05-15 | Updated: 2019-05-16 Backdoor AttackPoisoningAttack Type 2019.05.15 2025.05.28 Literature Database
Adversarial Defense Framework for Graph Neural Network Authors: Shen Wang, Zhengzhang Chen, Jingchao Ni, Xiao Yu, Zhichun Li, Haifeng Chen, Philip S. Yu | Published: 2019-05-09 | Updated: 2019-05-10 FrameworkPoisoningRobust Estimation 2019.05.09 2025.05.28 Literature Database
Cognitive Triaging of Phishing Attacks Authors: Amber van der Heijden, Luca Allodi | Published: 2019-05-06 | Updated: 2019-05-29 Data Collection MethodPoisoningAttack Scenario Analysis 2019.05.06 2025.05.28 Literature Database