Universal adversarial examples in speech command classification Authors: Jon Vadillo, Roberto Santana | Published: 2019-11-22 | Updated: 2021-02-13 Adversarial ExampleAdversarial Attack MethodsResearch Methodology 2019.11.22 2025.05.28 Literature Database
Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation Authors: Alexander Levine, Soheil Feizi | Published: 2019-11-21 Model Performance EvaluationNumerical Stability IssuesAdversarial Attack Methods 2019.11.21 2025.05.28 Literature Database
Fine-grained Synthesis of Unrestricted Adversarial Examples Authors: Omid Poursaeed, Tianxing Jiang, Yordanos Goshu, Harry Yang, Serge Belongie, Ser-Nam Lim | Published: 2019-11-20 | Updated: 2020-10-22 Model Performance EvaluationModel DesignAdversarial Attack Methods 2019.11.20 2025.05.28 Literature Database
Deep Minimax Probability Machine Authors: Lirong He, Ziyi Guo, Kaizhu Huang, Zenglin Xu | Published: 2019-11-20 Model Performance EvaluationAdversarial ExampleAdversarial Attack Methods 2019.11.20 2025.05.28 Literature Database
Adversarial Robustness of Flow-Based Generative Models Authors: Phillip Pope, Yogesh Balaji, Soheil Feizi | Published: 2019-11-20 Trade-off AnalysisModel DesignAdversarial Attack Methods 2019.11.20 2025.05.28 Literature Database
Generate (non-software) Bugs to Fool Classifiers Authors: Hiromu Yakura, Youhei Akimoto, Jun Sakuma | Published: 2019-11-20 Model Performance EvaluationAdversarial ExampleAdversarial Attack Methods 2019.11.20 2025.05.28 Literature Database
Towards non-toxic landscapes: Automatic toxic comment detection using DNN Authors: Ashwin Geet D'Sa, Irina Illina, Dominique Fohr | Published: 2019-11-19 | Updated: 2020-09-16 Class ImbalanceModel Performance EvaluationAdversarial Attack Methods 2019.11.19 2025.05.28 Literature Database
Deep Detector Health Management under Adversarial Campaigns Authors: Javier Echauz, Keith Kenemer, Sarfaraz Hussein, Jay Dhaliwal, Saurabh Shintre, Slawomir Grzonkowski, Andrew Gardner | Published: 2019-11-19 Class ImbalanceAdversarial ExampleAdversarial Attack Methods 2019.11.19 2025.05.28 Literature Database
Attack on Grid Event Cause Analysis: An Adversarial Machine Learning Approach Authors: Iman Niazazari, Hanif Livani | Published: 2019-11-19 | Updated: 2019-11-25 Adversarial ExampleAdversarial Attack MethodsEffectiveness Analysis of Defense Methods 2019.11.19 2025.05.28 Literature Database
WITCHcraft: Efficient PGD attacks with random step size Authors: Ping-Yeh Chiang, Jonas Geiping, Micah Goldblum, Tom Goldstein, Renkun Ni, Steven Reich, Ali Shafahi | Published: 2019-11-18 Convergence AnalysisReinforcement Learning AttackAdversarial Attack Methods 2019.11.18 2025.05.28 Literature Database