Adversarial Eigen Attack on Black-Box Models Authors: Linjun Zhou, Peng Cui, Yinan Jiang, Shiqiang Yang | Published: 2020-08-27 Adversarial attackOptimization StrategyDeep Learning Technology 2020.08.27 2025.05.28 Literature Database
Stronger and Faster Wasserstein Adversarial Attacks Authors: Kaiwen Wu, Allen Houze Wang, Yaoliang Yu | Published: 2020-08-06 WatermarkingAdversarial LearningAdversarial attack 2020.08.06 2025.05.28 Literature Database
TREND: Transferability based Robust ENsemble Design Authors: Deepak Ravikumar, Sangamesh Kodge, Isha Garg, Kaushik Roy | Published: 2020-08-04 | Updated: 2021-03-30 Adversarial ExampleAdversarial attackTransfer Learning 2020.08.04 2025.05.28 Literature Database
Robust and Accurate Authorship Attribution via Program Normalization Authors: Yizhen Wang, Mohannad Alhanahnah, Ke Wang, Mihai Christodorescu, Somesh Jha | Published: 2020-07-01 | Updated: 2022-02-25 Membership InferenceRobustnessAdversarial attack 2020.07.01 2025.05.28 Literature Database
Opportunities and Challenges in Deep Learning Adversarial Robustness: A Survey Authors: Samuel Henrique Silva, Peyman Najafirad | Published: 2020-07-01 | Updated: 2020-07-03 PoisoningAdversarial ExampleAdversarial attack 2020.07.01 2025.05.28 Literature Database
A Le Cam Type Bound for Adversarial Learning and Applications Authors: Qiuling Xu, Kevin Bello, Jean Honorio | Published: 2020-07-01 | Updated: 2021-02-10 Adversarial ExampleAdversarial attackMachine Learning Method 2020.07.01 2025.05.28 Literature Database
Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection Authors: Deqiang Li, Qianmu Li | Published: 2020-06-30 PoisoningMalware EvolutionAdversarial attack 2020.06.30 2025.05.28 Literature Database
FDA3 : Federated Defense Against Adversarial Attacks for Cloud-Based IIoT Applications Authors: Yunfei Song, Tian Liu, Tongquan Wei, Xiangfeng Wang, Zhe Tao, Mingsong Chen | Published: 2020-06-28 Adversarial ExampleAdversarial attackDefense Mechanism 2020.06.28 2025.05.28 Literature Database
ATOM: Robustifying Out-of-distribution Detection Using Outlier Mining Authors: Jiefeng Chen, Yixuan Li, Xi Wu, Yingyu Liang, Somesh Jha | Published: 2020-06-26 | Updated: 2021-06-30 Out-of-Distribution DetectionAdversarial Example DetectionAdversarial attack 2020.06.26 2025.05.28 Literature Database
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods? Authors: Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu | Published: 2020-06-26 | Updated: 2022-07-28 Backdoor AttackAdversarial Example DetectionAdversarial attack 2020.06.26 2025.05.28 Literature Database