Downscaling Attack and Defense: Turning What You See Back Into What You Get Authors: Andrew J. Lohn | Published: 2020-10-06 | Updated: 2020-10-07 Attack TypeAdversarial attackImage Processing 2020.10.06 2025.05.28 Literature Database
Adversarial Boot Camp: label free certified robustness in one epoch Authors: Ryan Campbell, Chris Finlay, Adam M Oberman | Published: 2020-10-05 Robustness Improvement MethodImprovement of LearningAdversarial attack 2020.10.05 2025.05.28 Literature Database
Model extraction from counterfactual explanations Authors: Ulrich Aïvodji, Alexandre Bolot, Sébastien Gambs | Published: 2020-09-03 Model Extraction AttackCausal InterpretationAdversarial attack 2020.09.03 2025.05.28 Literature Database
Yet Meta Learning Can Adapt Fast, It Can Also Break Easily Authors: Han Xu, Yaxin Li, Xiaorui Liu, Hui Liu, Jiliang Tang | Published: 2020-09-02 Meta-Learning MethodAdversarial ExampleAdversarial attack 2020.09.02 2025.05.28 Literature Database
Adversarial Attacks on Deep Learning Systems for User Identification based on Motion Sensors Authors: Cezara Benegui, Radu Tudor Ionescu | Published: 2020-09-02 | Updated: 2020-11-05 Adversarial ExampleAdversarial attackDeep Learning Technology 2020.09.02 2025.05.28 Literature Database
Vulnerability-Aware Poisoning Mechanism for Online RL with Unknown Dynamics Authors: Yanchao Sun, Da Huo, Furong Huang | Published: 2020-09-02 | Updated: 2022-02-15 Reinforcement Learning AlgorithmAdversarial attackOptimization Strategy 2020.09.02 2025.05.28 Literature Database
MALCOM: Generating Malicious Comments to Attack Neural Fake News Detection Models Authors: Thai Le, Suhang Wang, Dongwon Lee | Published: 2020-09-01 | Updated: 2020-09-27 Data GenerationText Generation MethodAdversarial attack 2020.09.01 2025.05.28 Literature Database
Imitation Privacy Authors: Xun Xian, Xinran Wang, Mingyi Hong, Jie Ding, Reza Ghanadan | Published: 2020-08-30 Data GenerationInformation Hiding TechniquesAdversarial attack 2020.08.30 2025.05.28 Literature Database
Benchmarking adversarial attacks and defenses for time-series data Authors: Shoaib Ahmed Siddiqui, Andreas Dengel, Sheraz Ahmed | Published: 2020-08-30 Adversarial ExampleAdversarial attackDeep Learning Technology 2020.08.30 2025.05.28 Literature Database
Adversarial Privacy Preserving Graph Embedding against Inference Attack Authors: Kaiyang Li, Guangchun Luo, Yang Ye, Wei Li, Shihao Ji, Zhipeng Cai | Published: 2020-08-30 Privacy ProtectionMembership InferenceAdversarial attack 2020.08.30 2025.05.28 Literature Database