On the Robustness of Domain Constraints Authors: Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick McDaniel | Published: 2021-05-18 | Updated: 2021-11-07 Data Integrity ConstraintsMembership InferenceAdversarial Learning 2021.05.18 2025.05.28 Literature Database
Undistillable: Making A Nasty Teacher That CANNOT teach students Authors: Haoyu Ma, Tianlong Chen, Ting-Kuei Hu, Chenyu You, Xiaohui Xie, Zhangyang Wang | Published: 2021-05-16 Adversarial LearningDeep Learning TechnologySelf-Supervised Learning 2021.05.16 2025.05.28 Literature Database
Cybersecurity Anomaly Detection in Adversarial Environments Authors: David A. Bierbrauer, Alexander Chang, Will Kritzer, Nathaniel D. Bastian | Published: 2021-05-14 | Updated: 2021-11-02 ML-Based IDSModel SelectionAdversarial Learning 2021.05.14 2025.05.28 Literature Database
Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain Authors: Jinyu Tian, Jiantao Zhou, Yuanman Li, Jia Duan | Published: 2021-03-07 Attack Scenario AnalysisAdversarial Example DetectionAdversarial Learning 2021.03.07 2025.05.28 Literature Database
With False Friends Like These, Who Can Notice Mistakes? Authors: Lue Tao, Lei Feng, Jinfeng Yi, Songcan Chen | Published: 2020-12-29 | Updated: 2021-12-13 Adversarial ExampleAdversarial LearningDefense Mechanism 2020.12.29 2025.05.28 Literature Database
Autoencoding Variational Autoencoder Authors: A. Taylan Cemgil, Sumedh Ghaisas, Krishnamurthy Dvijotham, Sven Gowal, Pushmeet Kohli | Published: 2020-12-07 Adversarial LearningGenerative Model CharacteristicsSelf-Learning Method 2020.12.07 2025.05.28 Literature Database
TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic Authors: Peter Jachim, Filipo Sharevski, Paige Treebridge | Published: 2020-12-04 | Updated: 2020-12-07 Content ModerationSecurity AnalysisAdversarial Learning 2020.12.04 2025.05.28 Literature Database
Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-12-03 | Updated: 2021-03-09 Attack MethodAdversarial ExampleAdversarial Learning 2020.12.03 2025.05.28 Literature Database
Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme Authors: Kunjal Panchal | Published: 2020-10-29 Password GuessingAdversarial LearningGenerative Model Characteristics 2020.10.29 2025.05.28 Literature Database
Understanding Catastrophic Overfitting in Single-step Adversarial Training Authors: Hoki Kim, Woojin Lee, Jaewook Lee | Published: 2020-10-05 | Updated: 2020-12-15 PoisoningRobustness EvaluationAdversarial Learning 2020.10.05 2025.05.28 Literature Database