On Defending Against Label Flipping Attacks on Malware Detection Systems Authors: Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti | Published: 2019-08-13 | Updated: 2020-06-16 PoisoningAdversarial Attack MethodsComputational Complexity 2019.08.13 2025.05.28 Literature Database
On the Adversarial Robustness of Neural Networks without Weight Transport Authors: Mohamed Akrout | Published: 2019-08-09 | Updated: 2019-10-03 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2019.08.09 2025.05.28 Literature Database
Defending Against Adversarial Iris Examples Using Wavelet Decomposition Authors: Sobhan Soleymani, Ali Dabouei, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2019-08-08 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2019.08.08 2025.05.28 Literature Database
Universal Adversarial Audio Perturbations Authors: Sajjad Abdoli, Luiz G. Hafemann, Jerome Rony, Ismail Ben Ayed, Patrick Cardinal, Alessandro L. Koerich | Published: 2019-08-08 | Updated: 2020-11-17 Adversarial ExampleAdversarial Attack MethodsSpeech Signal Processing 2019.08.08 2025.05.28 Literature Database
Investigating Decision Boundaries of Trained Neural Networks Authors: Roozbeh Yousefzadeh, Dianne P O'Leary | Published: 2019-08-07 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2019.08.07 2025.05.28 Literature Database
BlurNet: Defense by Filtering the Feature Maps Authors: Ravi Raju, Mikko Lipasti | Published: 2019-08-06 | Updated: 2020-05-16 Robustness Improvement MethodAttack EvaluationAdversarial Attack Methods 2019.08.06 2025.05.28 Literature Database
A principled approach for generating adversarial images under non-smooth dissimilarity metrics Authors: Aram-Alexandre Pooladian, Chris Finlay, Tim Hoheisel, Adam Oberman | Published: 2019-08-05 | Updated: 2019-10-08 Robustness Improvement MethodAttack EvaluationAdversarial Attack Methods 2019.08.05 2025.05.28 Literature Database
A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding Models Authors: Heng Chang, Yu Rong, Tingyang Xu, Wenbing Huang, Honglei Zhang, Peng Cui, Wenwu Zhu, Junzhou Huang | Published: 2019-08-04 | Updated: 2019-12-17 Graph FilteringPrompt InjectionAdversarial Attack Methods 2019.08.04 2025.05.28 Literature Database
Robustness properties of Facebook’s ResNeXt WSL models Authors: A. Emin Orhan | Published: 2019-07-17 | Updated: 2019-12-09 Adversarial Attack MethodsDeep Learning TechnologyWatermarking Technology 2019.07.17 2025.05.28 Literature Database
Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics Authors: Yuxin Ma, Tiankai Xie, Jundong Li, Ross Maciejewski | Published: 2019-07-17 | Updated: 2019-10-03 Backdoor AttackPoisoningAdversarial Attack Methods 2019.07.17 2025.05.28 Literature Database