ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models Authors: Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, Cho-Jui Hsieh | Published: 2017-08-14 | Updated: 2017-11-02 PoisoningCertified RobustnessAttack Method 2017.08.14 2025.05.28 Literature Database
Cascade Adversarial Machine Learning Regularized with a Unified Embedding Authors: Taesik Na, Jong Hwan Ko, Saibal Mukhopadhyay | Published: 2017-08-08 | Updated: 2018-03-17 Robustness AnalysisAttack MethodAdversarial Learning 2017.08.08 2025.05.28 Literature Database
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be Authors: Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin | Published: 2017-03-28 IoT Security IssuesSecurity Analysis MethodAttack Method 2017.03.28 2025.05.28 Literature Database