Wasserstein Adversarial Examples via Projected Sinkhorn Iterations Authors: Eric Wong, Frank R. Schmidt, J. Zico Kolter | Published: 2019-02-21 | Updated: 2020-01-18 Wasserstein DistanceCertified RobustnessAdversarial Attack Methods 2019.02.21 2025.05.28 Literature Database
There are No Bit Parts for Sign Bits in Black-Box Attacks Authors: Abdullah Al-Dujaili, Una-May O'Reilly | Published: 2019-02-19 | Updated: 2019-04-03 Certified RobustnessAdversarial Attack MethodsOptimization Strategy 2019.02.19 2025.05.28 Literature Database
On Evaluating Adversarial Robustness Authors: Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian Goodfellow, Aleksander Madry, Alexey Kurakin | Published: 2019-02-18 | Updated: 2019-02-20 Certified RobustnessRobustness Improvement MethodAdversarial Attack Methods 2019.02.18 2025.05.28 Literature Database
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces Authors: Mohammad Saidur Rahman, Mohsen Imani, Nate Mathews, Matthew Wright | Published: 2019-02-18 | Updated: 2020-10-28 Backdoor DetectionAdversarial ExampleAdversarial Attack Methods 2019.02.18 2025.05.28 Literature Database
A Little Is Enough: Circumventing Defenses For Distributed Learning Authors: Moran Baruch, Gilad Baruch, Yoav Goldberg | Published: 2019-02-16 Adversarial LearningAdversarial attackAdversarial Attack Methods 2019.02.16 2025.05.28 Literature Database
Mitigation of Adversarial Examples in RF Deep Classifiers Utilizing AutoEncoder Pre-training Authors: Silvija Kokalj-Filipovic, Rob Miller, Nicholas Chang, Chi Leung Lau | Published: 2019-02-16 PoisoningAdversarial attackAdversarial Attack Methods 2019.02.16 2025.05.28 Literature Database
Adversarial Examples in RF Deep Learning: Detection of the Attack and its Physical Robustness Authors: Silvija Kokalj-Filipovic, Rob Miller | Published: 2019-02-16 Adversarial ExampleAdversarial attackAdversarial Attack Methods 2019.02.16 2025.05.28 Literature Database
Can Intelligent Hyperparameter Selection Improve Resistance to Adversarial Examples? Authors: Cody Burkard, Brent Lagesse | Published: 2019-02-14 Adversarial ExampleAdversarial Example DetectionAdversarial Attack Methods 2019.02.14 2025.05.28 Literature Database
The Odds are Odd: A Statistical Test for Detecting Adversarial Examples Authors: Kevin Roth, Yannic Kilcher, Thomas Hofmann | Published: 2019-02-13 | Updated: 2019-05-09 Certified RobustnessAdversarial attackAdversarial Attack Methods 2019.02.13 2025.05.28 Literature Database
Adversarial Samples on Android Malware Detection Systems for IoT Systems Authors: Xiaolei Liu, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Mohsen Guizani | Published: 2019-02-12 Malware Detection MethodAdversarial Attack MethodsOptimization Strategy 2019.02.12 2025.05.28 Literature Database