A principled approach for generating adversarial images under non-smooth dissimilarity metrics Authors: Aram-Alexandre Pooladian, Chris Finlay, Tim Hoheisel, Adam Oberman | Published: 2019-08-05 | Updated: 2019-10-08 Robustness Improvement MethodAttack EvaluationAdversarial Attack Methods 2019.08.05 2025.05.28 Literature Database
Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks Authors: Tribhuvanesh Orekondy, Bernt Schiele, Mario Fritz | Published: 2019-06-26 | Updated: 2020-03-03 Certified RobustnessDetection of Model Extraction AttacksAttack Evaluation 2019.06.26 2025.05.28 Literature Database
Misleading Authorship Attribution of Source Code using Adversarial Learning Authors: Erwin Quiring, Alwin Maier, Konrad Rieck | Published: 2019-05-29 | Updated: 2019-05-31 Attack EvaluationAdversarial attackAuthor Attribution Method 2019.05.29 2025.05.28 Literature Database
Implementing SCADA Scenarios and Introducing Attacks to Obtain Training Data for Intrusion Detection Methods Authors: Simon Duque Antón, Michael Gundall, Daniel Fraunholz, Hans Dieter Schotten | Published: 2019-05-28 Data Collection MethodAttack EvaluationMachine Learning 2019.05.28 2025.05.28 Literature Database
Beyond Explainability: Leveraging Interpretability for Improved Adversarial Learning Authors: Devinder Kumar, Ibrahim Ben-Daya, Kanav Vats, Jeffery Feng, Graham Taylor and, Alexander Wong | Published: 2019-04-21 Attack EvaluationAdversarial TrainingMachine Learning Technology 2019.04.21 2025.05.28 Literature Database
Robust Website Fingerprinting Through the Cache Occupancy Channel Authors: Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom | Published: 2018-11-17 | Updated: 2019-02-21 Fingerprinting MethodAttack EvaluationDefense Method 2018.11.17 2025.05.28 Literature Database
RadIoT: Radio Communications Intrusion Detection for IoT – A Protocol Independent Approach Authors: Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre | Published: 2018-11-09 IoT SecuritySignal AnalysisAttack Evaluation 2018.11.09 2025.05.28 Literature Database
Universal Decision-Based Black-Box Perturbations: Breaking Security-Through-Obscurity Defenses Authors: Thomas A. Hogan, Bhavya Kailkhura | Published: 2018-11-09 | Updated: 2018-11-13 Trigger DetectionMalicious Content GenerationAttack Evaluation 2018.11.09 2025.05.28 Literature Database
FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning Authors: Faiq Khalid, Muhammmad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique | Published: 2018-11-04 Model Extraction AttackAttack EvaluationDefense Method 2018.11.04 2025.05.28 Literature Database
SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters Authors: Hassan Ali, Faiq Khalid, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-04 | Updated: 2020-05-15 Trigger DetectionRobustness ImprovementAttack Evaluation 2018.11.04 2025.05.28 Literature Database