HRFA: High-Resolution Feature-based Attack Authors: Zhixing Ye, Sizhe Chen, Peidong Zhang, Chengjin Sun, Xiaolin Huang | Published: 2020-01-21 | Updated: 2020-10-22 Adversarial ExampleAdversarial Attack DetectionGenerative Adversarial Network 2020.01.21 2025.05.28 Literature Database
Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet Authors: Sizhe Chen, Zhengbao He, Chengjin Sun, Jie Yang, Xiaolin Huang | Published: 2020-01-16 | Updated: 2020-10-21 Adversarial LearningAdversarial Attack DetectionResearch Methodology 2020.01.16 2025.05.28 Literature Database
Square Attack: a query-efficient black-box adversarial attack via random search Authors: Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion, Matthias Hein | Published: 2019-11-29 | Updated: 2020-07-29 Model EvaluationAdversarial Attack DetectionAdversarial Training 2019.11.29 2025.05.28 Literature Database
A New Defense Against Adversarial Images: Turning a Weakness into a Strength Authors: Tao Yu, Shengyuan Hu, Chuan Guo, Wei-Lun Chao, Kilian Q. Weinberger | Published: 2019-10-16 | Updated: 2019-12-04 Model RobustnessAdversarial LearningAdversarial Attack Detection 2019.10.16 2025.05.28 Literature Database
Universal, transferable and targeted adversarial attacks Authors: Junde Wu, Rao Fu | Published: 2019-08-29 | Updated: 2022-06-13 PoisoningAdversarial ExampleAdversarial Attack Detection 2019.08.29 2025.05.28 Literature Database
Detection of Backdoors in Trained Classifiers Without Access to the Training Set Authors: Zhen Xiang, David J. Miller, George Kesidis | Published: 2019-08-27 | Updated: 2020-08-19 Backdoor AttackAttack TypeAdversarial Attack Detection 2019.08.27 2025.05.28 Literature Database
Adversarial Edit Attacks for Tree Data Authors: Benjamin Paaßen | Published: 2019-08-25 | Updated: 2019-08-27 Adversarial ExampleAdversarial Attack DetectionMachine Learning Application 2019.08.25 2025.05.28 Literature Database
Characterizing Attacks on Deep Reinforcement Learning Authors: Xinlei Pan, Chaowei Xiao, Warren He, Shuang Yang, Jian Peng, Mingjie Sun, Jinfeng Yi, Zijiang Yang, Mingyan Liu, Bo Li, Dawn Song | Published: 2019-07-21 | Updated: 2022-02-16 Adversarial Attack DetectionDeep Reinforcement LearningPhysical attack 2019.07.21 2025.05.28 Literature Database
Trust but Verify: An Information-Theoretic Explanation for the Adversarial Fragility of Machine Learning Systems, and a General Defense against Adversarial Attacks Authors: Jirong Yi, Hui Xie, Leixin Zhou, Xiaodong Wu, Weiyu Xu, Raghuraman Mudumbai | Published: 2019-05-25 Adversarial ExampleAdversarial Attack DetectionSpeech Signal Processing 2019.05.25 2025.05.28 Literature Database
On the Connection Between Adversarial Robustness and Saliency Map Interpretability Authors: Christian Etmann, Sebastian Lunz, Peter Maass, Carola-Bibiane Schönlieb | Published: 2019-05-10 Robust EstimationAdversarial Attack Detectionloss of Interpretability 2019.05.10 2025.05.28 Literature Database