Adversarial Reinforcement Learning for Observer Design in Autonomous Systems under Cyber Attacks Authors: Abhishek Gupta, Zhaoyuan Yang | Published: 2018-09-15 Online LearningRobustness Improvement MethodAdversarial Attack Methods 2018.09.15 2025.05.28 Literature Database
Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers Authors: Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach | Published: 2018-04-23 | Updated: 2020-10-03 Query Generation MethodCertified RobustnessAdversarial Attack Methods 2018.04.23 2025.05.28 Literature Database
Black-box Adversarial Attacks with Limited Queries and Information Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin | Published: 2018-04-23 | Updated: 2018-07-11 Model Extraction AttackAdversarial ExampleAdversarial Attack Methods 2018.04.23 2025.05.28 Literature Database
Gradient Masking Causes CLEVER to Overestimate Adversarial Perturbation Size Authors: Ian Goodfellow | Published: 2018-04-21 Adversarial LearningAdversarial Attack MethodsWatermarking Technology 2018.04.21 2025.05.28 Literature Database
ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector Authors: Shang-Tse Chen, Cory Cornelius, Jason Martin, Duen Horng Chau | Published: 2018-04-16 | Updated: 2019-05-01 Faster R-CNNCertified RobustnessAdversarial Attack Methods 2018.04.16 2025.05.28 Literature Database
On the Limitation of MagNet Defense against $L_1$-based Adversarial Examples Authors: Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu | Published: 2018-04-14 | Updated: 2018-05-09 Adversarial Example DetectionAdversarial Attack MethodsWatermarking Technology 2018.04.14 2025.05.28 Literature Database
Detecting Adversarial Examples – A Lesson from Multimedia Forensics Authors: Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme | Published: 2018-03-09 Adversarial ExampleAdversarial Example DetectionAdversarial Attack Methods 2018.03.09 2025.05.28 Literature Database
Adversarial Perturbation Intensity Achieving Chosen Intra-Technique Transferability Level for Logistic Regression Authors: Martin Gubri | Published: 2018-01-06 Certified RobustnessAdversarial Attack MethodsMachine Learning Algorithm 2018.01.06 2025.05.28 Literature Database
Did you hear that? Adversarial Examples Against Automatic Speech Recognition Authors: Moustafa Alzantot, Bharathan Balaji, Mani Srivastava | Published: 2018-01-02 Adversarial Attack MethodsMachine Learning AlgorithmSpeech Enhancement Technology 2018.01.02 2025.05.28 Literature Database
Building Robust Deep Neural Networks for Road Sign Detection Authors: Arkar Min Aung, Yousef Fadila, Radian Gondokaryono, Luis Gonzalez | Published: 2017-12-26 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2017.12.26 2025.05.28 Literature Database