Fundamental Tradeoffs between Invariance and Sensitivity to Adversarial Perturbations Authors: Florian Tramèr, Jens Behrmann, Nicholas Carlini, Nicolas Papernot, Jörn-Henrik Jacobsen | Published: 2020-02-11 | Updated: 2020-08-04 Robustness EvaluationAdversarial ExampleAdversarial attack 2020.02.11 2025.05.28 Literature Database
Robustness of Bayesian Neural Networks to Gradient-Based Attacks Authors: Ginevra Carbone, Matthew Wicker, Luca Laurenti, Andrea Patane, Luca Bortolussi, Guido Sanguinetti | Published: 2020-02-11 | Updated: 2020-06-24 Robustness EvaluationRobustness Improvement MethodAdversarial attack 2020.02.11 2025.05.28 Literature Database
Adversarial Attacks on Linear Contextual Bandits Authors: Evrard Garcelon, Baptiste Roziere, Laurent Meunier, Jean Tarbouriech, Olivier Teytaud, Alessandro Lazaric, Matteo Pirotta | Published: 2020-02-10 | Updated: 2020-10-23 Advice ProvisionRobustness EvaluationAdversarial attack 2020.02.10 2025.05.28 Literature Database
Adversarial Data Encryption Authors: Yingdong Hu, Liang Zhang, Wei Shan, Xiaoxiao Qin, Jing Qi, Zhenzhou Wu, Yang Yuan | Published: 2020-02-10 | Updated: 2020-02-11 PoisoningAdversarial attackCryptography 2020.02.10 2025.05.28 Literature Database
Manipulating Reinforcement Learning: Poisoning Attacks on Cost Signals Authors: Yunhan Huang, Quanyan Zhu | Published: 2020-02-07 | Updated: 2020-07-20 Q-Learning AlgorithmConvergence AnalysisAdversarial attack 2020.02.07 2025.05.28 Literature Database
On the Resilience of Biometric Authentication Systems against Random Inputs Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar | Published: 2020-01-13 | Updated: 2020-01-24 PoisoningAdversarial attackMachine Learning 2020.01.13 2025.05.28 Literature Database
Membership Inference Attacks Against Object Detection Models Authors: Yeachan Park, Myungjoo Kang | Published: 2020-01-12 | Updated: 2020-01-28 Membership InferenceAdversarial attackMachine Learning 2020.01.12 2025.05.28 Literature Database
Fast is better than free: Revisiting adversarial training Authors: Eric Wong, Leslie Rice, J. Zico Kolter | Published: 2020-01-12 Adversarial ExampleAdversarial attackDeep Learning Method 2020.01.12 2025.05.28 Literature Database
Attack Agnostic Statistical Method for Adversarial Detection Authors: Sambuddha Saha, Aashish Kumar, Pratyush Sahay, George Jose, Srinivas Kruthiventi, Harikrishna Muralidhara | Published: 2019-11-22 Adversarial ExampleAdversarial attackResearch Methodology 2019.11.22 2025.05.28 Literature Database
Minimalistic Attacks: How Little it Takes to Fool a Deep Reinforcement Learning Policy Authors: Xinghua Qu, Zhu Sun, Yew-Soon Ong, Abhishek Gupta, Pengfei Wei | Published: 2019-11-10 | Updated: 2020-10-29 Reinforcement Learning AlgorithmReinforcement Learning AttackAdversarial attack 2019.11.10 2025.05.28 Literature Database