Adversarial Examples – A Complete Characterisation of the Phenomenon Authors: Alexandru Constantin Serban, Erik Poll, Joost Visser | Published: 2018-10-02 | Updated: 2019-02-17 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2018.10.02 2025.05.28 Literature Database
Improving the Generalization of Adversarial Training with Domain Adaptation Authors: Chuanbiao Song, Kun He, Liwei Wang, John E. Hopcroft | Published: 2018-10-01 | Updated: 2019-03-15 Robustness Improvement MethodAdversarial LearningAdversarial Attack Methods 2018.10.01 2025.05.28 Literature Database
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks Authors: Kenneth T. Co, Luis Muñoz-González, Sixte de Maupeou, Emil C. Lupu | Published: 2018-09-30 | Updated: 2019-11-23 Certified RobustnessRobustness Improvement MethodAdversarial Attack Methods 2018.09.30 2025.05.28 Literature Database
Statistical Inference Attack Against PHY-layer Key Extraction and Countermeasures Authors: Rui Zhu, Tao Shu, Huirong Fu | Published: 2018-09-29 Security of Signal TransmissionAdversarial Attack MethodsCommunication Model 2018.09.29 2025.05.28 Literature Database
Adversarial Attacks and Defences: A Survey Authors: Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, Debdeep Mukhopadhyay | Published: 2018-09-28 Model InversionAdversarial ExampleAdversarial Attack Methods 2018.09.28 2025.05.28 Literature Database
Explainable Black-Box Attacks Against Model-based Authentication Authors: Washington Garcia, Joseph I. Choi, Suman K. Adari, Somesh Jha, Kevin R. B. Butler | Published: 2018-09-28 XAI (Explainable AI)Model InversionAdversarial Attack Methods 2018.09.28 2025.05.28 Literature Database
Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2018-09-26 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2018.09.26 2025.05.28 Literature Database
Fast Geometrically-Perturbed Adversarial Faces Authors: Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2018-09-24 | Updated: 2018-09-28 Robustness Improvement MethodAdversarial Attack MethodsGenerative Model 2018.09.24 2025.05.28 Literature Database
Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization Authors: Bao Wang, Alex T. Lin, Wei Zhu, Penghang Yin, Andrea L. Bertozzi, Stanley J. Osher | Published: 2018-09-23 | Updated: 2020-04-29 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2018.09.23 2025.05.28 Literature Database
Unrestricted Adversarial Examples Authors: Tom B. Brown, Nicholas Carlini, Chiyuan Zhang, Catherine Olsson, Paul Christiano, Ian Goodfellow | Published: 2018-09-22 Robustness Improvement MethodAdversarial Attack MethodsDefense Mechanism 2018.09.22 2025.05.28 Literature Database