Adversarial Out-domain Examples for Generative Models Authors: Dario Pasquini, Marco Mingione, Massimo Bernaschi | Published: 2019-03-07 | Updated: 2019-05-13 Out-of-Distribution DetectionAdversarial LearningAdversarial Training 2019.03.07 2025.05.28 Literature Database
GanDef: A GAN based Adversarial Training Defense for Neural Network Classifier Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah | Published: 2019-03-06 Certified RobustnessAdversarial LearningAdversarial Training 2019.03.06 2025.05.28 Literature Database
Complement Objective Training Authors: Hao-Yun Chen, Pei-Hsin Wang, Chun-Hao Liu, Shih-Chieh Chang, Jia-Yu Pan, Yu-Ting Chen, Wei Wei, Da-Cheng Juan | Published: 2019-03-04 | Updated: 2019-03-21 Multi-Class ClassificationRobustness Improvement MethodAdversarial Learning 2019.03.04 2025.05.28 Literature Database
Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications Authors: Bryse Flowers, R. Michael Buehrer, William C. Headley | Published: 2019-03-01 Adversarial LearningAdversarial Perturbation TechniquesWireless Channel Detection 2019.03.01 2025.05.28 Literature Database
Enhancing the Robustness of Deep Neural Networks by Boundary Conditional GAN Authors: Ke Sun, Zhanxing Zhu, Zhouchen Lin | Published: 2019-02-28 Certified RobustnessRobustness Improvement MethodAdversarial Learning 2019.02.28 2025.05.28 Literature Database
Towards Understanding Adversarial Examples Systematically: Exploring Data Size, Task and Model Factors Authors: Ke Sun, Zhanxing Zhu, Zhouchen Lin | Published: 2019-02-28 Robustness EvaluationAdversarial Example DetectionAdversarial Learning 2019.02.28 2025.05.28 Literature Database
Adversarial Attacks on Time Series Authors: Fazle Karim, Somshubra Majumdar, Houshang Darabi | Published: 2019-02-27 | Updated: 2019-03-01 Model Extraction AttackAdversarial ExampleAdversarial Learning 2019.02.27 2025.05.28 Literature Database
The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation Detection Authors: Muhammad Zaid Hameed, Andras Gyorgy, Deniz Gunduz | Published: 2019-02-27 | Updated: 2020-04-07 Adversarial ExampleAdversarial LearningWireless Channel Detection 2019.02.27 2025.05.28 Literature Database
Design of intentional backdoors in sequential models Authors: Zhaoyuan Yang, Naresh Iyer, Johan Reimann, Nurali Virani | Published: 2019-02-26 Backdoor AttackReinforcement Learning AttackAdversarial Learning 2019.02.26 2025.05.28 Literature Database
Adversarial attacks hidden in plain sight Authors: Jan Philip Göpfert, André Artelt, Heiko Wersing, Barbara Hammer | Published: 2019-02-25 | Updated: 2020-04-26 Backdoor AttackRobustness EvaluationAdversarial Learning 2019.02.25 2025.05.28 Literature Database