Attack-agnostic Adversarial Detection on Medical Data Using Explainable Machine Learning Authors: Matthew Watson, Noura Al Moubayed | Published: 2021-05-05 Medical Image AnalysisVulnerability of Adversarial ExamplesAdversarial attack 2021.05.05 2025.05.28 Literature Database
Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling Authors: Md Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh | Published: 2021-03-11 Model Performance EvaluationReverse EngineeringAdversarial attack 2021.03.11 2025.05.28 Literature Database
BODAME: Bilevel Optimization for Defense Against Model Extraction Authors: Yuto Mori, Atsushi Nitanda, Akiko Takeda | Published: 2021-03-11 Model Performance EvaluationAdversarial attackSelection and Evaluation of Optimization Algorithms 2021.03.11 2025.05.28 Literature Database
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack Authors: Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici | Published: 2021-03-10 Attack DetectionAdversarial attackThreat Model 2021.03.10 2025.05.28 Literature Database
Diagnosing Vulnerability of Variational Auto-Encoders to Adversarial Attacks Authors: Anna Kuzina, Max Welling, Jakub M. Tomczak | Published: 2021-03-10 | Updated: 2021-05-06 Model Performance EvaluationAdversarial attackVulnerability Analysis 2021.03.10 2025.05.28 Literature Database
Proof-of-Learning: Definitions and Practice Authors: Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Anvith Thudi, Varun Chandrasekaran, Nicolas Papernot | Published: 2021-03-09 Data DependencyModel Performance EvaluationAdversarial attack 2021.03.09 2025.05.28 Literature Database
Generating Black-Box Adversarial Examples in Sparse Domain Authors: Hadi Zanddizari, Behnam Zeinali, J. Morris Chang | Published: 2021-01-22 | Updated: 2021-10-15 Performance EvaluationAdversarial ExampleAdversarial attack 2021.01.22 2025.05.28 Literature Database
Voting based ensemble improves robustness of defensive models Authors: Devvrit, Minhao Cheng, Cho-Jui Hsieh, Inderjit Dhillon | Published: 2020-11-28 Model Performance EvaluationAttack TypeAdversarial attack 2020.11.28 2025.05.28 Literature Database
Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack Authors: Rui Shu, Tianpei Xia, Laurie Williams, Tim Menzies | Published: 2020-11-23 | Updated: 2021-10-12 Model Performance EvaluationAdversarial ExampleAdversarial attack 2020.11.23 2025.05.28 Literature Database
Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams Authors: Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David Wagner | Published: 2020-11-19 | Updated: 2021-11-01 Performance EvaluationAdversarial attackSelection and Evaluation of Optimization Algorithms 2020.11.19 2025.05.28 Literature Database