Can You Really Backdoor Federated Learning? Authors: Ziteng Sun, Peter Kairouz, Ananda Theertha Suresh, H. Brendan McMahan | Published: 2019-11-18 | Updated: 2019-12-02 Adversarial Attack MethodsThreat ModelEffectiveness Analysis of Defense Methods 2019.11.18 2025.05.28 Literature Database
A New Ensemble Adversarial Attack Powered by Long-term Gradient Memories Authors: Zhaohui Che, Ali Borji, Guangtao Zhai, Suiyi Ling, Jing Li, Patrick Le Callet | Published: 2019-11-18 Backdoor AttackModel Performance EvaluationAdversarial Attack Methods 2019.11.18 2025.05.28 Literature Database
Black-Box Adversarial Attack with Transferable Model-based Embedding Authors: Zhichao Huang, Tong Zhang | Published: 2019-11-17 | Updated: 2020-01-05 Adversarial ExampleAdversarial Attack MethodsKnowledge Transferability 2019.11.17 2025.05.28 Literature Database
Defending Against Model Stealing Attacks with Adaptive Misinformation Authors: Sanjay Kariyappa, Moinuddin K Qureshi | Published: 2019-11-16 Adversarial ExampleAdversarial Attack MethodsEffectiveness Analysis of Defense Methods 2019.11.16 2025.05.28 Literature Database
Suspicion-Free Adversarial Attacks on Clustering Algorithms Authors: Anshuman Chhabra, Abhishek Roy, Prasant Mohapatra | Published: 2019-11-16 Model Performance EvaluationNumerical Stability IssuesAdversarial Attack Methods 2019.11.16 2025.05.28 Literature Database
DomainGAN: Generating Adversarial Examples to Attack Domain Generation Algorithm Classifiers Authors: Isaac Corley, Jonathan Lwowski, Justin Hoffman | Published: 2019-11-14 | Updated: 2020-02-14 Botnet DetectionModel Performance EvaluationAdversarial Attack Methods 2019.11.14 2025.05.28 Literature Database
There is Limited Correlation between Coverage and Robustness for Deep Neural Networks Authors: Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Dai Ting | Published: 2019-11-14 Model Performance EvaluationAdversarial ExampleAdversarial Attack Methods 2019.11.14 2025.05.28 Literature Database
Adversarial Examples in Modern Machine Learning: A Review Authors: Rey Reza Wiyatno, Anqi Xu, Ousmane Dia, Archy de Berker | Published: 2019-11-13 | Updated: 2019-11-15 PoisoningAdversarial ExampleAdversarial Attack Methods 2019.11.13 2025.05.28 Literature Database
On Robustness to Adversarial Examples and Polynomial Optimization Authors: Pranjal Awasthi, Abhratanu Dutta, Aravindan Vijayaraghavan | Published: 2019-11-12 Model Performance EvaluationAdversarial Attack MethodsComputational Problem 2019.11.12 2025.05.28 Literature Database
Patch augmentation: Towards efficient decision boundaries for neural networks Authors: Marcus D. Bloice, Peter M. Roth, Andreas Holzinger | Published: 2019-11-08 | Updated: 2019-11-25 Model Performance EvaluationAdversarial Attack MethodsFeature Engineering 2019.11.08 2025.05.28 Literature Database