Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review Authors: Huda Ali Alatwi, Charles Morisset | Published: 2021-12-06 PoisoningAdversarial ExampleAdversarial Attack Detection 2021.12.06 2025.05.28 Literature Database
Availability Attacks Create Shortcuts Authors: Da Yu, Huishuai Zhang, Wei Chen, Jian Yin, Tie-Yan Liu | Published: 2021-11-01 | Updated: 2022-06-02 DDoS AttackData GenerationAdversarial Attack Detection 2021.11.01 2025.05.28 Literature Database
Detecting and Identifying Optical Signal Attacks on Autonomous Driving Systems Authors: Jindi Zhang, Yifan Zhang, Kejie Lu, Jianping Wang, Kui Wu, Xiaohua Jia, Bin Liu | Published: 2021-10-20 Sensor State EstimationAdversarial Attack DetectionAutomotive Network Security 2021.10.20 2025.05.28 Literature Database
Adversarial Examples Detection with Bayesian Neural Network Authors: Yao Li, Tongyi Tang, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-05-18 | Updated: 2024-02-23 Performance EvaluationAdversarial ExampleAdversarial Attack Detection 2021.05.18 2025.05.28 Literature Database
Real-time Detection of Practical Universal Adversarial Perturbations Authors: Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Emil C. Lupu | Published: 2021-05-16 | Updated: 2021-05-22 UAP Training MethodAdversarial Attack DetectionDefense Mechanism 2021.05.16 2025.05.28 Literature Database
Adversarial Concept Drift Detection under Poisoning Attacks for Robust Data Stream Mining Authors: Łukasz Korycki, Bartosz Krawczyk | Published: 2020-09-20 Drift Detection MethodPoisoningAdversarial Attack Detection 2020.09.20 2025.05.28 Literature Database
Robust Deep Learning Ensemble against Deception Authors: Wenqi Wei, Ling Liu | Published: 2020-09-14 Adversarial ExampleAdversarial Attack DetectionAdversarial Training 2020.09.14 2025.05.28 Literature Database
Adversary Agnostic Robust Deep Reinforcement Learning Authors: Xinghua Qu, Yew-Soon Ong, Abhishek Gupta, Zhu Sun | Published: 2020-08-14 | Updated: 2020-12-24 Policy engineeringAdversarial Attack DetectionMachine Learning Method 2020.08.14 2025.05.28 Literature Database
Trace-Norm Adversarial Examples Authors: Ehsan Kazemi, Thomas Kerdreux, Liqiang Wang | Published: 2020-07-02 Algorithm DesignAdversarial Attack DetectionDefense Mechanism 2020.07.02 2025.05.28 Literature Database
Defensive Approximation: Securing CNNs using Approximate Computing Authors: Amira Guesmi, Ihsen Alouani, Khaled Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael Abu-Ghazaleh | Published: 2020-06-13 | Updated: 2021-07-29 Adversarial ExampleAdversarial Attack DetectionApproximate Calculation 2020.06.13 2025.05.28 Literature Database