Adversarial Examples in RF Deep Learning: Detection of the Attack and its Physical Robustness Authors: Silvija Kokalj-Filipovic, Rob Miller | Published: 2019-02-16 Adversarial ExampleAdversarial attackAdversarial Attack Methods 2019.02.16 2025.05.28 Literature Database
Can Intelligent Hyperparameter Selection Improve Resistance to Adversarial Examples? Authors: Cody Burkard, Brent Lagesse | Published: 2019-02-14 Adversarial ExampleAdversarial Example DetectionAdversarial Attack Methods 2019.02.14 2025.05.28 Literature Database
The Odds are Odd: A Statistical Test for Detecting Adversarial Examples Authors: Kevin Roth, Yannic Kilcher, Thomas Hofmann | Published: 2019-02-13 | Updated: 2019-05-09 Certified RobustnessAdversarial attackAdversarial Attack Methods 2019.02.13 2025.05.28 Literature Database
Adversarial Samples on Android Malware Detection Systems for IoT Systems Authors: Xiaolei Liu, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Mohsen Guizani | Published: 2019-02-12 Malware Detection MethodAdversarial Attack MethodsOptimization Strategy 2019.02.12 2025.05.28 Literature Database
Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis Authors: Danilo Vasconcellos Vargas, Jiawei Su | Published: 2019-02-08 Certified RobustnessAdversarial Attack MethodsImage Classification Interpretation 2019.02.08 2025.05.28 Literature Database
ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System Authors: Huangxun Chen, Chenyu Huang, Qianyi Huang, Qian Zhang, Wei Wang | Published: 2019-01-12 | Updated: 2020-01-14 Trigger DetectionModel EvaluationAdversarial Attack Methods 2019.01.12 2025.05.28 Literature Database
Exploring Adversarial Examples in Malware Detection Authors: Octavian Suciu, Scott E. Coull, Jeffrey Johns | Published: 2018-10-18 | Updated: 2019-04-13 PoisoningAdversarial ExampleAdversarial Attack Methods 2018.10.18 2025.05.28 Literature Database
A Training-based Identification Approach to VIN Adversarial Examples Authors: Yingdi Wang, Wenjia Niu, Tong Chen, Yingxiao Xiang, Jingjing Liu, Gang Li, Jiqiang Liu | Published: 2018-10-18 Robustness Improvement MethodAdversarial Example DetectionAdversarial Attack Methods 2018.10.18 2025.05.28 Literature Database
Security Matters: A Survey on Adversarial Machine Learning Authors: Guofu Li, Pengjia Zhu, Jin Li, Zhemin Yang, Ning Cao, Zhiyi Chen | Published: 2018-10-16 | Updated: 2018-10-23 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2018.10.16 2025.05.28 Literature Database
The Adversarial Attack and Detection under the Fisher Information Metric Authors: Chenxiao Zhao, P. Thomas Fletcher, Mixue Yu, Yaxin Peng, Guixu Zhang, Chaomin Shen | Published: 2018-10-09 | Updated: 2019-02-09 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2018.10.09 2025.05.28 Literature Database