The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation Detection Authors: Muhammad Zaid Hameed, Andras Gyorgy, Deniz Gunduz | Published: 2019-02-27 | Updated: 2020-04-07 Adversarial ExampleAdversarial LearningWireless Channel Detection 2019.02.27 2025.05.28 Literature Database
Design of intentional backdoors in sequential models Authors: Zhaoyuan Yang, Naresh Iyer, Johan Reimann, Nurali Virani | Published: 2019-02-26 Backdoor AttackReinforcement Learning AttackAdversarial Learning 2019.02.26 2025.05.28 Literature Database
Adversarial attacks hidden in plain sight Authors: Jan Philip Göpfert, André Artelt, Heiko Wersing, Barbara Hammer | Published: 2019-02-25 | Updated: 2020-04-26 Backdoor AttackRobustness EvaluationAdversarial Learning 2019.02.25 2025.05.28 Literature Database
Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence Authors: Yi Han, David Hubczenko, Paul Montague, Olivier De Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah Erfani | Published: 2019-02-25 | Updated: 2020-08-17 Backdoor AttackReinforcement Learning AttackAdversarial Learning 2019.02.25 2025.05.28 Literature Database
A Convex Relaxation Barrier to Tight Robustness Verification of Neural Networks Authors: Hadi Salman, Greg Yang, Huan Zhang, Cho-Jui Hsieh, Pengchuan Zhang | Published: 2019-02-23 | Updated: 2020-01-10 Certified RobustnessRobustness EvaluationAdversarial Learning 2019.02.23 2025.05.28 Literature Database
Quantifying Perceptual Distortion of Adversarial Examples Authors: Matt Jordan, Naren Manoj, Surbhi Goel, Alexandros G. Dimakis | Published: 2019-02-21 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2019.02.21 2025.05.28 Literature Database
advertorch v0.1: An Adversarial Robustness Toolbox based on PyTorch Authors: Gavin Weiguang Ding, Luyu Wang, Xiaomeng Jin | Published: 2019-02-20 PoisoningAdversarial LearningResearch Methodology 2019.02.20 2025.05.28 Literature Database
A Little Is Enough: Circumventing Defenses For Distributed Learning Authors: Moran Baruch, Gilad Baruch, Yoav Goldberg | Published: 2019-02-16 Adversarial LearningAdversarial attackAdversarial Attack Methods 2019.02.16 2025.05.28 Literature Database
Model Compression with Adversarial Robustness: A Unified Optimization Framework Authors: Shupeng Gui, Haotao Wang, Chen Yu, Haichuan Yang, Zhangyang Wang, Ji Liu | Published: 2019-02-10 | Updated: 2019-12-28 Adversarial LearningAdversarial attackOptimization Strategy 2019.02.10 2025.05.28 Literature Database
Is Spiking Secure? A Comparative Study on the Security Vulnerabilities of Spiking and Deep Neural Networks Authors: Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique | Published: 2019-02-04 | Updated: 2020-05-18 Adversarial ExampleAdversarial LearningAdversarial attack 2019.02.04 2025.05.28 Literature Database