With False Friends Like These, Who Can Notice Mistakes? Authors: Lue Tao, Lei Feng, Jinfeng Yi, Songcan Chen | Published: 2020-12-29 | Updated: 2021-12-13 Adversarial ExampleAdversarial LearningDefense Mechanism 2020.12.29 2025.05.28 Literature Database
Autoencoding Variational Autoencoder Authors: A. Taylan Cemgil, Sumedh Ghaisas, Krishnamurthy Dvijotham, Sven Gowal, Pushmeet Kohli | Published: 2020-12-07 Adversarial LearningGenerative Model CharacteristicsSelf-Learning Method 2020.12.07 2025.05.28 Literature Database
TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic Authors: Peter Jachim, Filipo Sharevski, Paige Treebridge | Published: 2020-12-04 | Updated: 2020-12-07 Content ModerationSecurity AnalysisAdversarial Learning 2020.12.04 2025.05.28 Literature Database
Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-12-03 | Updated: 2021-03-09 Attack MethodAdversarial ExampleAdversarial Learning 2020.12.03 2025.05.28 Literature Database
Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme Authors: Kunjal Panchal | Published: 2020-10-29 Password GuessingAdversarial LearningGenerative Model Characteristics 2020.10.29 2025.05.28 Literature Database
Understanding Catastrophic Overfitting in Single-step Adversarial Training Authors: Hoki Kim, Woojin Lee, Jaewook Lee | Published: 2020-10-05 | Updated: 2020-12-15 PoisoningRobustness EvaluationAdversarial Learning 2020.10.05 2025.05.28 Literature Database
Adversarially Training for Audio Classifiers Authors: Raymel Alfonso Sallo, Mohammad Esmaeilpour, Patrick Cardinal | Published: 2020-08-26 | Updated: 2020-10-25 Adversarial ExampleAdversarial LearningSpeech Signal Processing 2020.08.26 2025.05.28 Literature Database
Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning Authors: Yinghua Zhang, Yangqiu Song, Jian Liang, Kun Bai, Qiang Yang | Published: 2020-08-25 PoisoningAdversarial LearningDeep Learning 2020.08.25 2025.05.28 Literature Database
Near Optimal Adversarial Attacks on Stochastic Bandits and Defenses with Smoothed Responses Authors: Shiliang Zuo | Published: 2020-08-21 | Updated: 2024-03-14 Game TheoryAttack MethodAdversarial Learning 2020.08.21 2025.05.28 Literature Database
Defending Distributed Classifiers Against Data Poisoning Attacks Authors: Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie | Published: 2020-08-21 PoisoningAttack MethodAdversarial Learning 2020.08.21 2025.05.28 Literature Database