Security Matters: A Survey on Adversarial Machine Learning Authors: Guofu Li, Pengjia Zhu, Jin Li, Zhemin Yang, Ning Cao, Zhiyi Chen | Published: 2018-10-16 | Updated: 2018-10-23 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2018.10.16 2025.05.28 Literature Database
The Adversarial Attack and Detection under the Fisher Information Metric Authors: Chenxiao Zhao, P. Thomas Fletcher, Mixue Yu, Yaxin Peng, Guixu Zhang, Chaomin Shen | Published: 2018-10-09 | Updated: 2019-02-09 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2018.10.09 2025.05.28 Literature Database
Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network Authors: Xuanqing Liu, Yao Li, Chongruo Wu, Cho-Jui Hsieh | Published: 2018-10-01 | Updated: 2019-05-04 Certified RobustnessRobustness Improvement MethodAdversarial Learning 2018.10.01 2025.05.28 Literature Database
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks Authors: Kenneth T. Co, Luis Muñoz-González, Sixte de Maupeou, Emil C. Lupu | Published: 2018-09-30 | Updated: 2019-11-23 Certified RobustnessRobustness Improvement MethodAdversarial Attack Methods 2018.09.30 2025.05.28 Literature Database
Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2018-09-26 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2018.09.26 2025.05.28 Literature Database
Neural Networks with Structural Resistance to Adversarial Attacks Authors: Luca de Alfaro | Published: 2018-09-25 PoisoningCertified RobustnessRobustness Improvement Method 2018.09.25 2025.05.28 Literature Database
Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization Authors: Bao Wang, Alex T. Lin, Wei Zhu, Penghang Yin, Andrea L. Bertozzi, Stanley J. Osher | Published: 2018-09-23 | Updated: 2020-04-29 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2018.09.23 2025.05.28 Literature Database
Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks Authors: Siyue Wang, Xiao Wang, Pu Zhao, Wujie Wen, David Kaeli, Peter Chin, Xue Lin | Published: 2018-09-13 Certified RobustnessRobustness ImprovementAdversarial Example 2018.09.13 2025.05.28 Literature Database
Query-Efficient Black-Box Attack by Active Learning Authors: Pengcheng Li, Jinfeng Yi, Lijun Zhang | Published: 2018-09-13 Query Generation MethodCertified RobustnessAdversarial attack 2018.09.13 2025.05.28 Literature Database
Adversarial Examples: Opportunities and Challenges Authors: Jiliang Zhang, Chen Li | Published: 2018-09-13 | Updated: 2019-09-23 Certified RobustnessAdversarial ExampleDefense Method 2018.09.13 2025.05.28 Literature Database