Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning Authors: Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang | Published: 2019-04-01 | Updated: 2019-11-30 Model Extraction AttackReconstruction AttackAdversarial Attack Detection 2019.04.01 2025.05.28 Literature Database
Defending against adversarial attacks by randomized diversification Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-04-01 Adversarial Example DetectionAdversarial Attack DetectionWatermark Robustness 2019.04.01 2025.05.28 Literature Database
On the Vulnerability of CNN Classifiers in EEG-Based BCIs Authors: Xiao Zhang, Dongrui Wu | Published: 2019-03-31 Certified RobustnessAdversarial LearningAdversarial Attack Detection 2019.03.31 2025.05.28 Literature Database
Benchmarking Neural Network Robustness to Common Corruptions and Perturbations Authors: Dan Hendrycks, Thomas Dietterich | Published: 2019-03-28 Robust OptimizationAdversarial LearningAdversarial Attack Detection 2019.03.28 2025.05.28 Literature Database
Rallying Adversarial Techniques against Deep Learning for Network Security Authors: Joseph Clements, Yuzhe Yang, Ankur Sharma, Hongxin Hu, Yingjie Lao | Published: 2019-03-27 | Updated: 2021-10-25 Effective Perturbation MethodsAdversarial LearningAdversarial Attack Detection 2019.03.27 2025.05.28 Literature Database
Scaling up the randomized gradient-free adversarial attack reveals overestimation of robustness using established attacks Authors: Francesco Croce, Jonas Rauber, Matthias Hein | Published: 2019-03-27 | Updated: 2019-09-25 Trigger DetectionAdversarial LearningAdversarial Attack Detection 2019.03.27 2025.05.28 Literature Database
A geometry-inspired decision-based attack Authors: Yujia Liu, Seyed-Mohsen Moosavi-Dezfooli, Pascal Frossard | Published: 2019-03-26 Certified RobustnessEffective Perturbation MethodsAdversarial Attack Detection 2019.03.26 2025.05.28 Literature Database
Defending against Whitebox Adversarial Attacks via Randomized Discretization Authors: Yuchen Zhang, Percy Liang | Published: 2019-03-25 Certified RobustnessEffective Perturbation MethodsAdversarial Attack Detection 2019.03.25 2025.05.28 Literature Database
Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness Authors: Jörn-Henrik Jacobsen, Jens Behrmannn, Nicholas Carlini, Florian Tramèr, Nicolas Papernot | Published: 2019-03-25 Certified RobustnessVulnerability of Adversarial ExamplesAdversarial Attack Detection 2019.03.25 2025.05.28 Literature Database
Robust Neural Networks using Randomized Adversarial Training Authors: Alexandre Araujo, Laurent Meunier, Rafael Pinot, Benjamin Negrevergne | Published: 2019-03-25 | Updated: 2020-02-13 Certified RobustnessAdversarial LearningAdversarial Attack Detection 2019.03.25 2025.05.28 Literature Database