Adversarial Training and Robustness for Multiple Perturbations Authors: Florian Tramèr, Dan Boneh | Published: 2019-04-30 | Updated: 2019-10-18 Robust EstimationAdversarial ExampleAdversarial Attack Methods 2019.04.30 2025.05.28 Literature Database
A Robust Approach for Securing Audio Classification Against Adversarial Attacks Authors: Mohammad Esmaeilpour, Patrick Cardinal, Alessandro Lameiras Koerich | Published: 2019-04-24 | Updated: 2019-11-25 Backdoor AttackAdversarial ExampleAdversarial Attack Methods 2019.04.24 2025.05.28 Literature Database
A Target-Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning Authors: Shahbaz Rezaei, Xin Liu | Published: 2019-04-08 | Updated: 2020-01-29 Model evaluation methodsAdversarial Attack MethodsDeep Learning Technology 2019.04.08 2025.05.28 Literature Database
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems Authors: Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson | Published: 2019-03-18 Signal Processing TechniquesAdversarial Attack MethodsSpeech Synthesis Technology 2019.03.18 2025.05.28 Literature Database
A Research Agenda: Dynamic Models to Defend Against Correlated Attacks Authors: Ian Goodfellow | Published: 2019-03-14 Certified RobustnessDynamic Service SchedulingAdversarial Attack Methods 2019.03.14 2025.05.28 Literature Database
Attribution-driven Causal Analysis for Detection of Adversarial Examples Authors: Susmit Jha, Sunny Raj, Steven Lawrence Fernandes, Sumit Kumar Jha, Somesh Jha, Gunjan Verma, Brian Jalaian, Ananthram Swami | Published: 2019-03-14 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2019.03.14 2025.05.28 Literature Database
TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents Authors: Panagiota Kiourti, Kacper Wardega, Susmit Jha, Wenchao Li | Published: 2019-03-01 PoisoningReinforcement LearningAdversarial Attack Methods 2019.03.01 2025.05.28 Literature Database
Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment Authors: Ziqi Yang, Ee-Chien Chang, Zhenkai Liang | Published: 2019-02-22 Model InversionAdversarial Attack MethodsOptimization Methods 2019.02.22 2025.05.28 Literature Database
Adversarial Attacks on Graph Neural Networks via Meta Learning Authors: Daniel Zügner, Stephan Günnemann | Published: 2019-02-22 | Updated: 2024-01-28 Graph ConstructionAdversarial ExampleAdversarial Attack Methods 2019.02.22 2025.05.28 Literature Database
Quantifying Perceptual Distortion of Adversarial Examples Authors: Matt Jordan, Naren Manoj, Surbhi Goel, Alexandros G. Dimakis | Published: 2019-02-21 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2019.02.21 2025.05.28 Literature Database