Detecting Adversarial Examples – A Lesson from Multimedia Forensics Authors: Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme | Published: 2018-03-09 Adversarial ExampleAdversarial Example DetectionAdversarial Attack Methods 2018.03.09 2025.05.28 Literature Database
Adversarial Perturbation Intensity Achieving Chosen Intra-Technique Transferability Level for Logistic Regression Authors: Martin Gubri | Published: 2018-01-06 Certified RobustnessAdversarial Attack MethodsMachine Learning Algorithm 2018.01.06 2025.05.28 Literature Database
Did you hear that? Adversarial Examples Against Automatic Speech Recognition Authors: Moustafa Alzantot, Bharathan Balaji, Mani Srivastava | Published: 2018-01-02 Adversarial Attack MethodsMachine Learning AlgorithmSpeech Enhancement Technology 2018.01.02 2025.05.28 Literature Database
Building Robust Deep Neural Networks for Road Sign Detection Authors: Arkar Min Aung, Yousef Fadila, Radian Gondokaryono, Luis Gonzalez | Published: 2017-12-26 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2017.12.26 2025.05.28 Literature Database
Query-limited Black-box Attacks to Classifiers Authors: Fnu Suya, Yuan Tian, David Evans, Paolo Papotti | Published: 2017-12-23 Query Generation MethodAdversarial Attack MethodsMachine Learning Algorithm 2017.12.23 2025.05.28 Literature Database
Query-Efficient Black-box Adversarial Examples (superceded) Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin | Published: 2017-12-19 | Updated: 2018-04-06 PoisoningAdversarial LearningAdversarial Attack Methods 2017.12.19 2025.05.28 Literature Database
When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time Authors: David J. Miller, Yulia Wang, George Kesidis | Published: 2017-12-18 | Updated: 2018-06-28 Trigger DetectionAdversarial ExampleAdversarial Attack Methods 2017.12.18 2025.05.28 Literature Database
Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models Authors: Wieland Brendel, Jonas Rauber, Matthias Bethge | Published: 2017-12-12 | Updated: 2018-02-16 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2017.12.12 2025.05.28 Literature Database
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning Authors: Battista Biggio, Fabio Roli | Published: 2017-12-08 | Updated: 2018-07-19 PoisoningAdversarial LearningAdversarial Attack Methods 2017.12.08 2025.05.28 Literature Database
Generative Adversarial Perturbations Authors: Omid Poursaeed, Isay Katsman, Bicheng Gao, Serge Belongie | Published: 2017-12-06 | Updated: 2018-07-06 Certified RobustnessAdversarial Attack MethodsGenerative Adversarial Network 2017.12.06 2025.05.28 Literature Database