Hack The Box: Fooling Deep Learning Abstraction-Based Monitors Authors: Sara Hajj Ibrahim, Mohamed Nassar | Published: 2021-07-10 | Updated: 2021-07-18 Attack Scenario AnalysisAdversarial ExampleVulnerability of Adversarial Examples 2021.07.10 2025.05.28 Literature Database
When and How to Fool Explainable Models (and Humans) with Adversarial Examples Authors: Jon Vadillo, Roberto Santana, Jose A. Lozano | Published: 2021-07-05 | Updated: 2023-07-07 Model InterpretabilityAdversarial ExampleAdversarial attack 2021.07.05 2025.05.28 Literature Database
On the (Un-)Avoidability of Adversarial Examples Authors: Sadia Chowdhury, Ruth Urner | Published: 2021-06-24 Robustness EvaluationAdversarial ExampleMachine Learning Algorithm 2021.06.24 2025.05.28 Literature Database
Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples Authors: Maura Pintor, Luca Demetrio, Angelo Sotgiu, Ambra Demontis, Nicholas Carlini, Battista Biggio, Fabio Roli | Published: 2021-06-18 | Updated: 2022-10-11 Adversarial ExampleOptimization StrategyDefense Mechanism 2021.06.18 2025.05.28 Literature Database
Localized Uncertainty Attacks Authors: Ousmane Amadou Dia, Theofanis Karaletsos, Caner Hazirbas, Cristian Canton Ferrer, Ilknur Kaynar Kabul, Erik Meijer | Published: 2021-06-17 Cyber AttackUncertainty EstimationAdversarial Example 2021.06.17 2025.05.28 Literature Database
Adversarial Examples Detection with Bayesian Neural Network Authors: Yao Li, Tongyi Tang, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-05-18 | Updated: 2024-02-23 Performance EvaluationAdversarial ExampleAdversarial Attack Detection 2021.05.18 2025.05.28 Literature Database
Mental Models of Adversarial Machine Learning Authors: Lukas Bieringer, Kathrin Grosse, Michael Backes, Battista Biggio, Katharina Krombholz | Published: 2021-05-08 | Updated: 2022-06-29 PoisoningMental ModelAdversarial Example 2021.05.08 2025.05.28 Literature Database
Who’s Afraid of Adversarial Transferability? Authors: Ziv Katzir, Yuval Elovici | Published: 2021-05-02 | Updated: 2022-10-06 Adversarial ExampleVulnerability of Adversarial ExamplesVulnerability Analysis 2021.05.02 2025.05.28 Literature Database
Adversarial Training for Deep Learning-based Intrusion Detection Systems Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees | Published: 2021-04-20 ML-Based IDSBackdoor AttackAdversarial Example 2021.04.20 2025.05.28 Literature Database
Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems Authors: Yue Gao, Ilia Shumailov, Kassem Fawaz | Published: 2021-04-18 | Updated: 2022-06-19 Adversarial ExampleAdversarial Example DetectionDefense Mechanism 2021.04.18 2025.05.28 Literature Database