Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent Authors: Pu Zhao, Pin-Yu Chen, Siyue Wang, Xue Lin | Published: 2020-02-18 Factors of Performance DegradationAdversarial Attack DetectionComputational Efficiency 2020.02.18 2025.05.28 Literature Database
Deflecting Adversarial Attacks Authors: Yao Qin, Nicholas Frosst, Colin Raffel, Garrison Cottrell, Geoffrey Hinton | Published: 2020-02-18 PoisoningAdversarial Attack DetectionDefense Method 2020.02.18 2025.05.28 Literature Database
On the Matrix-Free Generation of Adversarial Perturbations for Black-Box Attacks Authors: Hisaichi Shibata, Shouhei Hanaoka, Yukihiro Nomura, Naoto Hayashi, Osamu Abe | Published: 2020-02-18 Adversarial ExampleAdversarial Attack DetectionComputational Efficiency 2020.02.18 2025.05.28 Literature Database
Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets Authors: Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey, Xingjun Ma | Published: 2020-02-14 PoisoningAdversarial Attack DetectionDefense Method 2020.02.14 2025.05.28 Literature Database
Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning Authors: Inaam Ilahi, Muhammad Usama, Junaid Qadir, Muhammad Umar Janjua, Ala Al-Fuqaha, Dinh Thai Hoang, Dusit Niyato | Published: 2020-01-27 | Updated: 2021-09-08 Adversarial Attack DetectionFundamentals of Machine LearningDeep Reinforcement Learning 2020.01.27 2025.05.28 Literature Database
Practical Fast Gradient Sign Attack against Mammographic Image Classifier Authors: Ibrahim Yilmaz | Published: 2020-01-27 Adversarial LearningAdversarial Attack DetectionMachine Learning Method 2020.01.27 2025.05.28 Literature Database
Ensemble Noise Simulation to Handle Uncertainty about Gradient-based Adversarial Attacks Authors: Rehana Mahfuz, Rajeev Sahay, Aly El Gamal | Published: 2020-01-26 Adversarial LearningAdversarial Attack DetectionEffectiveness Analysis of Defense Methods 2020.01.26 2025.05.28 Literature Database
On the human evaluation of audio adversarial examples Authors: Jon Vadillo, Roberto Santana | Published: 2020-01-23 | Updated: 2021-02-12 Adversarial ExampleAdversarial Attack DetectionMalfunction of Voice Assistants 2020.01.23 2025.05.28 Literature Database
Adversarial Attack on Community Detection by Hiding Individuals Authors: Jia Li, Honglei Zhang, Zhichao Han, Yu Rong, Hong Cheng, Junzhou Huang | Published: 2020-01-22 Community DetectionPoisoningAdversarial Attack Detection 2020.01.22 2025.05.28 Literature Database
Massif: Interactive Interpretation of Adversarial Attacks on Deep Learning Authors: Nilaksh Das, Haekyu Park, Zijie J. Wang, Fred Hohman, Robert Firstman, Emily Rogers, Duen Horng Chau | Published: 2020-01-21 | Updated: 2020-02-16 Adversarial Attack DetectionDeep Reinforcement Learning 2020.01.21 2025.05.28 Literature Database