Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Willy Susilo, Yukun Bao | Published: 2019-02-23 Performance EvaluationPhishing DetectionPoisoning 2019.02.23 2025.05.28 Literature Database
advertorch v0.1: An Adversarial Robustness Toolbox based on PyTorch Authors: Gavin Weiguang Ding, Luyu Wang, Xiaomeng Jin | Published: 2019-02-20 PoisoningAdversarial LearningResearch Methodology 2019.02.20 2025.05.28 Literature Database
Mitigation of Adversarial Examples in RF Deep Classifiers Utilizing AutoEncoder Pre-training Authors: Silvija Kokalj-Filipovic, Rob Miller, Nicholas Chang, Chi Leung Lau | Published: 2019-02-16 PoisoningAdversarial attackAdversarial Attack Methods 2019.02.16 2025.05.28 Literature Database
Adversarial Attack and Defense on Graph Data: A Survey Authors: Lichao Sun, Yingtong Dou, Carl Yang, Ji Wang, Yixin Liu, Philip S. Yu, Lifang He, Bo Li | Published: 2018-12-26 | Updated: 2022-10-06 PoisoningRobustnessAdversarial Example 2018.12.26 2025.05.28 Literature Database
Analyzing Federated Learning through an Adversarial Lens Authors: Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal, Seraphin Calo | Published: 2018-11-29 | Updated: 2019-11-25 PoisoningFederated LearningWeight Update Method 2018.11.29 2025.05.28 Literature Database
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning Authors: Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh | Published: 2018-11-08 | Updated: 2019-08-26 PoisoningMalicious Content GenerationAdversarial Learning 2018.11.08 2025.05.28 Literature Database
TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-02 | Updated: 2020-05-14 Detection of Poison Data for Backdoor AttacksPoisoningPerformance Evaluation Method 2018.11.02 2025.05.28 Literature Database
Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks Authors: Davide Maiorca, Battista Biggio, Giorgio Giacinto | Published: 2018-11-02 | Updated: 2020-04-14 PoisoningMalware EvolutionCertified Robustness 2018.11.02 2025.05.28 Literature Database
Stronger Data Poisoning Attacks Break Data Sanitization Defenses Authors: Pang Wei Koh, Jacob Steinhardt, Percy Liang | Published: 2018-11-02 | Updated: 2021-12-03 PoisoningRobustness AnalysisRobust Optimization 2018.11.02 2025.05.28 Literature Database
Learning with Bad Training Data via Iterative Trimmed Loss Minimization Authors: Yanyao Shen, Sujay Sanghavi | Published: 2018-10-28 | Updated: 2019-02-18 Data CurationPoisoningRobust Estimation 2018.10.28 2025.05.28 Literature Database