Adversarial Robustness is at Odds with Lazy Training Authors: Yunjuan Wang, Enayat Ullah, Poorya Mianjy, Raman Arora | Published: 2022-06-18 | Updated: 2022-10-17 Algorithm DesignAdversarial ExampleAdversarial Attack Detection 2022.06.18 2025.05.28 Literature Database
Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection Authors: Abderrahmen Amich, Ata Kaboudi, Birhanu Eshete | Published: 2022-06-15 RobustnessAdversarial ExampleAdversarial Attack Methods 2022.06.15 2025.05.28 Literature Database
Fusing Feature Engineering and Deep Learning: A Case Study for Malware Classification Authors: Daniel Gibert, Carles Mateu, Jordi Planes, Quan Le | Published: 2022-06-12 Malware DetectionAdversarial ExampleDeep Learning Method 2022.06.12 2025.05.28 Literature Database
A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning Authors: Alberto Blanco-Justicia, David Sanchez, Josep Domingo-Ferrer, Krishnamurty Muralidhar | Published: 2022-06-09 | Updated: 2022-07-05 Privacy AssessmentImpact of GeneralizationAdversarial Example 2022.06.09 2025.05.28 Literature Database
Improving Adversarial Robustness by Putting More Regularizations on Less Robust Samples Authors: Dongyoon Yang, Insung Kong, Yongdai Kim | Published: 2022-06-07 | Updated: 2023-06-01 RobustnessAdversarial ExampleAdversarial Attack Methods 2022.06.07 2025.05.28 Literature Database
Adversarial attacks and defenses in Speaker Recognition Systems: A survey Authors: Jiahe Lan, Rui Zhang, Zheng Yan, Jie Wang, Yu Chen, Ronghui Hou | Published: 2022-05-27 Adversarial ExampleAdversarial Attack MethodsSpeech Recognition Process 2022.05.27 2025.05.28 Literature Database
EBM Life Cycle: MCMC Strategies for Synthesis, Defense, and Density Modeling Authors: Mitch Hill, Jonathan Mitchell, Chu Chen, Yuan Du, Mubarak Shah, Song-Chun Zhu | Published: 2022-05-24 Training Data GenerationFuture ResearchAdversarial Example 2022.05.24 2025.05.28 Literature Database
Robust Sensible Adversarial Learning of Deep Neural Networks for Image Classification Authors: Jungeum Kim, Xiao Wang | Published: 2022-05-20 Robustness EvaluationLoss FunctionAdversarial Example 2022.05.20 2025.05.28 Literature Database
Getting a-Round Guarantees: Floating-Point Attacks on Certified Robustness Authors: Jiankai Jin, Olga Ohrimenko, Benjamin I. P. Rubinstein | Published: 2022-05-20 | Updated: 2024-09-09 Robustness EvaluationAdversarial ExampleThreat Model 2022.05.20 2025.05.28 Literature Database
Focused Adversarial Attacks Authors: Thomas Cilloni, Charles Walter, Charles Fleming | Published: 2022-05-19 Attack Methods against DFLAttack TypeAdversarial Example 2022.05.19 2025.05.28 Literature Database