OGAN: Disrupting Deepfakes with an Adversarial Attack that Survives Training Authors: Eran Segalis, Eran Galili | Published: 2020-06-17 | Updated: 2020-11-25 Adversarial Attack MethodsMachine Learning AlgorithmImage Processing 2020.06.17 2025.05.28 Literature Database
QEBA: Query-Efficient Boundary-Based Blackbox Attack Authors: Huichen Li, Xiaojun Xu, Xiaolu Zhang, Shuang Yang, Bo Li | Published: 2020-05-28 Adversarial Attack MethodsPrivacy Protection in Machine LearningDimensionality Reduction Method 2020.05.28 2025.05.28 Literature Database
Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms Authors: Mohsen Minaei, S Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate | Published: 2020-05-28 Data Protection MethodPrivacy AssessmentAdversarial Attack Methods 2020.05.28 2025.05.28 Literature Database
Transferable Perturbations of Deep Feature Distributions Authors: Nathan Inkawhich, Kevin J Liang, Lawrence Carin, Yiran Chen | Published: 2020-04-27 Multi-Class ClassificationAdversarial Attack MethodsDeep Learning Technology 2020.04.27 2025.05.28 Literature Database
Improved Image Wasserstein Attacks and Defenses Authors: Edward J. Hu, Adith Swaminathan, Hadi Salman, Greg Yang | Published: 2020-04-26 | Updated: 2023-05-09 Robustness AnalysisAdversarial ExampleAdversarial Attack Methods 2020.04.26 2025.05.28 Literature Database
A Black-box Adversarial Attack Strategy with Adjustable Sparsity and Generalizability for Deep Image Classifiers Authors: Arka Ghosh, Sankha Subhra Mullick, Shounak Datta, Swagatam Das, Rammohan Mallipeddi, Asit Kr. Das | Published: 2020-04-24 | Updated: 2021-09-09 PoisoningAdversarial Attack MethodsOptimization Problem 2020.04.24 2025.05.28 Literature Database
Adversarial Attacks and Defenses: An Interpretation Perspective Authors: Ninghao Liu, Mengnan Du, Ruocheng Guo, Huan Liu, Xia Hu | Published: 2020-04-23 | Updated: 2020-10-07 PoisoningAdversarial ExampleAdversarial Attack Methods 2020.04.23 2025.05.28 Literature Database
Adversarial Machine Learning in Network Intrusion Detection Systems Authors: Elie Alhajjar, Paul Maxwell, Nathaniel D. Bastian | Published: 2020-04-23 Adversarial ExampleAdversarial Attack MethodsMachine Learning 2020.04.23 2025.05.28 Literature Database
Domain Adaptive Transfer Attack (DATA)-based Segmentation Networks for Building Extraction from Aerial Images Authors: Younghwan Na, Jun Hee Kim, Kyungsu Lee, Juhum Park, Jae Youn Hwang, Jihwan P. Choi | Published: 2020-04-11 | Updated: 2020-04-29 Semantic Information ExtractionGeneralization PerformanceAdversarial Attack Methods 2020.04.11 2025.05.28 Literature Database
A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks Authors: Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta | Published: 2020-03-26 | Updated: 2021-12-13 PoisoningAdversarial Attack MethodsVulnerability Attack Method 2020.03.26 2025.05.28 Literature Database