Security of Distributed Machine Learning: A Game-Theoretic Approach to Design Secure DSVM Authors: Rui Zhang, Quanyan Zhu | Published: 2020-03-08 | Updated: 2020-04-26 Game TheoryPoisoningAdversarial Attack Methods 2020.03.08 2025.05.28 Literature Database
Identifying Audio Adversarial Examples via Anomalous Pattern Detection Authors: Victor Akinwande, Celia Cintas, Skyler Speakman, Srihari Sridharan | Published: 2020-02-13 | Updated: 2020-07-25 Vulnerability of Adversarial ExamplesAdversarial Attack MethodsMachine Learning Application 2020.02.13 2025.05.28 Literature Database
Over-the-Air Adversarial Flickering Attacks against Video Recognition Networks Authors: Roi Pony, Itay Naeh, Shie Mannor | Published: 2020-02-12 | Updated: 2021-06-04 Video ClassificationExpression of GratitudeAdversarial Attack Methods 2020.02.12 2025.05.28 Literature Database
Attack based DoS attack detection using multiple classifier Authors: Mohamed Abushwereb, Muhannad Mustafa, Mouhammd Al-kasassbeh, Malik Qasaimeh | Published: 2020-01-16 DDoS Attack DetectionNetwork Threat DetectionAdversarial Attack Methods 2020.01.16 2025.05.28 Literature Database
Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning Authors: Roei Schuster, Tal Schuster, Yoav Meri, Vitaly Shmatikov | Published: 2020-01-14 Membership InferenceAdversarial Attack MethodsStatistical Analysis 2020.01.14 2025.05.28 Literature Database
Advbox: a toolbox to generate adversarial examples that fool neural networks Authors: Dou Goodman, Hao Xin, Wang Yang, Wu Yuesheng, Xiong Junfeng, Zhang Huan | Published: 2020-01-13 | Updated: 2020-08-26 PoisoningAdversarial ExampleAdversarial Attack Methods 2020.01.13 2025.05.28 Literature Database
Playing it Safe: Adversarial Robustness with an Abstain Option Authors: Cassidy Laidlaw, Soheil Feizi | Published: 2019-11-25 Adversarial LearningAdversarial ExampleAdversarial Attack Methods 2019.11.25 2025.05.28 Literature Database
One Man’s Trash is Another Man’s Treasure: Resisting Adversarial Examples by Adversarial Examples Authors: Chang Xiao, Changxi Zheng | Published: 2019-11-25 | Updated: 2019-11-27 Adversarial ExampleAdversarial Attack MethodsEffectiveness Analysis of Defense Methods 2019.11.25 2025.05.28 Literature Database
Adversarial Attack with Pattern Replacement Authors: Ziang Dong, Liang Mao, Shiliang Sun | Published: 2019-11-25 Model DesignAdversarial Attack MethodsResearch Methodology 2019.11.25 2025.05.28 Literature Database
Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Networks for Secure Inference Authors: Wei-An Lin, Yogesh Balaji, Pouya Samangouei, Rama Chellappa | Published: 2019-11-23 Model DesignAdversarial Attack MethodsResearch Methodology 2019.11.23 2025.05.28 Literature Database