Effects of Forward Error Correction on Communications Aware Evasion Attacks Authors: Matthew DelVecchio, Bryse Flowers, William C. Headley | Published: 2020-05-27 Adversarial attackMachine Learning TechnologyCommunication Loss 2020.05.27 2025.05.28 Literature Database
A Protection against the Extraction of Neural Network Models Authors: Hervé Chabanne, Vincent Despiegel, Linda Guiga | Published: 2020-05-26 | Updated: 2020-07-31 Adversarial attackMachine LearningMachine Learning Technology 2020.05.26 2025.05.28 Literature Database
Keyed Non-Parametric Hypothesis Tests Authors: Yao Cheng, Cheng-Kang Chu, Hsiao-Ying Lin, Marius Lombard-Platet, David Naccache | Published: 2020-05-25 PoisoningAdversarial attackMachine Learning Technology 2020.05.25 2025.05.28 Literature Database
Adversarial Feature Selection against Evasion Attacks Authors: Fei Zhang, Patrick P. K. Chan, Battista Biggio, Daniel S. Yeung, Fabio Roli | Published: 2020-05-25 PoisoningAdversarial attackFeature Extraction Method 2020.05.25 2025.05.28 Literature Database
Adversarial Attack on Hierarchical Graph Pooling Neural Networks Authors: Haoteng Tang, Guixiang Ma, Yurong Chen, Lei Guo, Wei Wang, Bo Zeng, Liang Zhan | Published: 2020-05-23 PoisoningAdversarial ExampleAdversarial attack 2020.05.23 2025.05.28 Literature Database
PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking Authors: Chong Xiang, Arjun Nitin Bhagoji, Vikash Sehwag, Prateek Mittal | Published: 2020-05-17 | Updated: 2021-03-31 Robustness AnalysisAdversarial attackFeature Extraction Method 2020.05.17 2025.05.28 Literature Database
Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection Authors: Olga Petrova, Karel Durkota, Galina Alperovich, Karel Horak, Michal Najman, Branislav Bosansky, Viliam Lisy | Published: 2020-04-22 Adversarial attackSelection and Evaluation of Optimization AlgorithmsAnomaly Detection Algorithm 2020.04.22 2025.05.28 Literature Database
Provably robust deep generative models Authors: Filipe Condessa, Zico Kolter | Published: 2020-04-22 Robustness Improvement MethodAdversarial attackDeep Learning Method 2020.04.22 2025.05.28 Literature Database
Gradient-based adversarial attacks on categorical sequence models via traversing an embedded world Authors: Ivan Fursov, Alexey Zaytsev, Nikita Kluchnikov, Andrey Kravchenko, Evgeny Burnaev | Published: 2020-03-09 | Updated: 2020-10-12 Adversarial ExampleAdversarial attackGenerative Model 2020.03.09 2025.05.28 Literature Database
Graph Universal Adversarial Attacks: A Few Bad Actors Ruin Graph Learning Models Authors: Xiao Zang, Yi Xie, Jie Chen, Bo Yuan | Published: 2020-02-12 | Updated: 2021-06-23 Graph Neural NetworkGraph PrivacyAdversarial attack 2020.02.12 2025.05.28 Literature Database