Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack Authors: Rui Shu, Tianpei Xia, Laurie Williams, Tim Menzies | Published: 2020-11-23 | Updated: 2021-10-12 Model Performance EvaluationAdversarial ExampleAdversarial attack 2020.11.23 2025.05.28 Literature Database
Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams Authors: Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David Wagner | Published: 2020-11-19 | Updated: 2021-11-01 Performance EvaluationAdversarial attackSelection and Evaluation of Optimization Algorithms 2020.11.19 2025.05.28 Literature Database
Adversarially Robust Classification based on GLRT Authors: Bhagyashree Puranik, Upamanyu Madhow, Ramtin Pedarsani | Published: 2020-11-16 WatermarkingPerformance EvaluationAdversarial attack 2020.11.16 2025.05.28 Literature Database
Almost Tight L0-norm Certified Robustness of Top-k Predictions against Adversarial Perturbations Authors: Jinyuan Jia, Binghui Wang, Xiaoyu Cao, Hongbin Liu, Neil Zhenqiang Gong | Published: 2020-11-15 | Updated: 2022-06-03 Model Performance EvaluationStability of PredictionsAdversarial attack 2020.11.15 2025.05.28 Literature Database
Efficient and Transferable Adversarial Examples from Bayesian Neural Networks Authors: Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen | Published: 2020-11-10 | Updated: 2022-06-18 Model Performance EvaluationAdversarial ExampleAdversarial attack 2020.11.10 2025.05.28 Literature Database
Blockchain based Attack Detection on Machine Learning Algorithms for IoT based E-Health Applications Authors: Thippa Reddy Gadekallu, Manoj M K, Sivarama Krishnan S, Neeraj Kumar, Saqib Hakak, Sweta Bhattacharya | Published: 2020-11-03 | Updated: 2021-10-02 Blockchain TechnologyAttack TypeAdversarial attack 2020.11.03 2025.05.28 Literature Database
Adversarial Examples in Constrained Domains Authors: Ryan Sheatsley, Nicolas Papernot, Michael Weisman, Gunjan Verma, Patrick McDaniel | Published: 2020-11-02 | Updated: 2022-09-09 Adversarial ExampleAdversarial attackFeature Engineering 2020.11.02 2025.05.28 Literature Database
Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples Authors: Sven Gowal, Chongli Qin, Jonathan Uesato, Timothy Mann, Pushmeet Kohli | Published: 2020-10-07 | Updated: 2021-03-30 PoisoningRobustness Improvement MethodAdversarial attack 2020.10.07 2025.05.28 Literature Database
Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples Authors: Yael Mathov, Eden Levy, Ziv Katzir, Asaf Shabtai, Yuval Elovici | Published: 2020-10-07 | Updated: 2021-09-02 Membership InferenceAdversarial attackMachine Learning 2020.10.07 2025.05.28 Literature Database
Constraining Logits by Bounded Function for Adversarial Robustness Authors: Sekitoshi Kanai, Masanori Yamada, Shin'ya Yamaguchi, Hiroshi Takahashi, Yasutoshi Ida | Published: 2020-10-06 Robustness Improvement MethodImprovement of LearningAdversarial attack 2020.10.06 2025.05.28 Literature Database