Detection of Backdoors in Trained Classifiers Without Access to the Training Set Authors: Zhen Xiang, David J. Miller, George Kesidis | Published: 2019-08-27 | Updated: 2020-08-19 Backdoor AttackAttack TypeAdversarial Attack Detection 2019.08.27 2025.05.28 Literature Database
Adversarial Edit Attacks for Tree Data Authors: Benjamin Paaßen | Published: 2019-08-25 | Updated: 2019-08-27 Adversarial ExampleAdversarial Attack DetectionMachine Learning Application 2019.08.25 2025.05.28 Literature Database
Characterizing Attacks on Deep Reinforcement Learning Authors: Xinlei Pan, Chaowei Xiao, Warren He, Shuang Yang, Jian Peng, Mingjie Sun, Jinfeng Yi, Zijiang Yang, Mingyan Liu, Bo Li, Dawn Song | Published: 2019-07-21 | Updated: 2022-02-16 Adversarial Attack DetectionDeep Reinforcement LearningPhysical attack 2019.07.21 2025.05.28 Literature Database
Trust but Verify: An Information-Theoretic Explanation for the Adversarial Fragility of Machine Learning Systems, and a General Defense against Adversarial Attacks Authors: Jirong Yi, Hui Xie, Leixin Zhou, Xiaodong Wu, Weiyu Xu, Raghuraman Mudumbai | Published: 2019-05-25 Adversarial ExampleAdversarial Attack DetectionSpeech Signal Processing 2019.05.25 2025.05.28 Literature Database
On the Connection Between Adversarial Robustness and Saliency Map Interpretability Authors: Christian Etmann, Sebastian Lunz, Peter Maass, Carola-Bibiane Schönlieb | Published: 2019-05-10 Robust EstimationAdversarial Attack Detectionloss of Interpretability 2019.05.10 2025.05.28 Literature Database
Adversarial Image Translation: Unrestricted Adversarial Examples in Face Recognition Systems Authors: Kazuya Kakizaki, Kosuke Yoshida | Published: 2019-05-09 | Updated: 2020-01-28 Factors of Performance DegradationAdversarial ExampleAdversarial Attack Detection 2019.05.09 2025.05.28 Literature Database
Adaptive Generation of Unrestricted Adversarial Inputs Authors: Isaac Dunn, Hadrien Pouget, Tom Melham, Daniel Kroening | Published: 2019-05-07 | Updated: 2019-10-01 Adversarial ExampleAdversarial Attack DetectionAdaptive Adversarial Training 2019.05.07 2025.05.28 Literature Database
Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples Authors: Vikash Sehwag, Arjun Nitin Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, Prateek Mittal | Published: 2019-05-05 PoisoningAdversarial ExampleAdversarial Attack Detection 2019.05.05 2025.05.28 Literature Database
CharBot: A Simple and Effective Method for Evading DGA Classifiers Authors: Jonathan Peck, Claire Nie, Raaghavi Sivaguru, Charles Grumer, Femi Olumofin, Bin Yu, Anderson Nascimento, Martine De Cock | Published: 2019-05-03 | Updated: 2019-05-30 Malware DetectionAdversarial Attack DetectionMachine Learning 2019.05.03 2025.05.28 Literature Database
Transfer of Adversarial Robustness Between Perturbation Types Authors: Daniel Kang, Yi Sun, Tom Brown, Dan Hendrycks, Jacob Steinhardt | Published: 2019-05-03 Adversarial ExampleAdversarial Attack DetectionAdaptive Adversarial Training 2019.05.03 2025.05.28 Literature Database