Mimic Learning to Generate a Shareable Network Intrusion Detection Model Authors: Ahmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud | Published: 2019-05-02 | Updated: 2020-02-18 PoisoningModel DesignMachine Learning 2019.05.02 2025.05.28 Literature Database
Adversarial Training for Free! Authors: Ali Shafahi, Mahyar Najibi, Amin Ghiasi, Zheng Xu, John Dickerson, Christoph Studer, Larry S. Davis, Gavin Taylor, Tom Goldstein | Published: 2019-04-29 | Updated: 2019-11-20 PoisoningAdversarial ExampleAdaptive Adversarial Training 2019.04.29 2025.05.28 Literature Database
Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks Authors: David J. Miller, Zhen Xiang, George Kesidis | Published: 2019-04-12 | Updated: 2019-12-02 Backdoor AttackPoisoningAdversarial Attack Detection 2019.04.12 2025.05.28 Literature Database
Online Data Poisoning Attack Authors: Xuezhou Zhang, Xiaojin Zhu, Laurent Lessard | Published: 2019-03-05 | Updated: 2019-05-30 PoisoningReinforcement Learning AttackOptimization Problem 2019.03.05 2025.05.28 Literature Database
PuVAE: A Variational Autoencoder to Purify Adversarial Examples Authors: Uiwon Hwang, Jaewoo Park, Hyemi Jang, Sungroh Yoon, Nam Ik Cho | Published: 2019-03-02 PoisoningRobustness Improvement MethodAdversarial Perturbation Techniques 2019.03.02 2025.05.28 Literature Database
Attacking Graph-based Classification via Manipulating the Graph Structure Authors: Binghui Wang, Neil Zhenqiang Gong | Published: 2019-03-01 | Updated: 2019-08-13 PoisoningModel InversionAdversarial Graph Classification 2019.03.01 2025.05.28 Literature Database
TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents Authors: Panagiota Kiourti, Kacper Wardega, Susmit Jha, Wenchao Li | Published: 2019-03-01 PoisoningReinforcement LearningAdversarial Attack Methods 2019.03.01 2025.05.28 Literature Database
Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Willy Susilo, Yukun Bao | Published: 2019-02-23 Performance EvaluationPhishing DetectionPoisoning 2019.02.23 2025.05.28 Literature Database
advertorch v0.1: An Adversarial Robustness Toolbox based on PyTorch Authors: Gavin Weiguang Ding, Luyu Wang, Xiaomeng Jin | Published: 2019-02-20 PoisoningAdversarial LearningResearch Methodology 2019.02.20 2025.05.28 Literature Database
Mitigation of Adversarial Examples in RF Deep Classifiers Utilizing AutoEncoder Pre-training Authors: Silvija Kokalj-Filipovic, Rob Miller, Nicholas Chang, Chi Leung Lau | Published: 2019-02-16 PoisoningAdversarial attackAdversarial Attack Methods 2019.02.16 2025.05.28 Literature Database