Query-limited Black-box Attacks to Classifiers Authors: Fnu Suya, Yuan Tian, David Evans, Paolo Papotti | Published: 2017-12-23 Query Generation MethodAdversarial Attack MethodsMachine Learning Algorithm 2017.12.23 2025.05.28 Literature Database
Query-Efficient Black-box Adversarial Examples (superceded) Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin | Published: 2017-12-19 | Updated: 2018-04-06 PoisoningAdversarial LearningAdversarial Attack Methods 2017.12.19 2025.05.28 Literature Database
When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time Authors: David J. Miller, Yulia Wang, George Kesidis | Published: 2017-12-18 | Updated: 2018-06-28 Trigger DetectionAdversarial ExampleAdversarial Attack Methods 2017.12.18 2025.05.28 Literature Database
Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models Authors: Wieland Brendel, Jonas Rauber, Matthias Bethge | Published: 2017-12-12 | Updated: 2018-02-16 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2017.12.12 2025.05.28 Literature Database
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning Authors: Battista Biggio, Fabio Roli | Published: 2017-12-08 | Updated: 2018-07-19 PoisoningAdversarial LearningAdversarial Attack Methods 2017.12.08 2025.05.28 Literature Database
Generative Adversarial Perturbations Authors: Omid Poursaeed, Isay Katsman, Bicheng Gao, Serge Belongie | Published: 2017-12-06 | Updated: 2018-07-06 Certified RobustnessAdversarial Attack MethodsGenerative Adversarial Network 2017.12.06 2025.05.28 Literature Database
Adversarial Phenomenon in the Eyes of Bayesian Deep Learning Authors: Ambrish Rawat, Martin Wistuba, Maria-Irina Nicolae | Published: 2017-11-22 Bayesian Deep LearningAdversarial ExampleAdversarial Attack Methods 2017.11.22 2025.05.28 Literature Database