Adversarial Robustness via Label-Smoothing Authors: Morgane Goibert, Elvis Dohmatob | Published: 2019-06-27 | Updated: 2019-10-15 Adversarial ExampleAdversarial attackDeep Learning Method 2019.06.27 2025.05.28 Literature Database
Adversarial Examples to Fool Iris Recognition Systems Authors: Sobhan Soleymani, Ali Dabouei, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2019-06-21 | Updated: 2019-07-18 Adversarial ExampleAdversarial attackDeep Learning Method 2019.06.21 2025.05.28 Literature Database
Deep Leakage from Gradients Authors: Ligeng Zhu, Zhijian Liu, Song Han | Published: 2019-06-21 | Updated: 2019-12-19 Privacy ProtectionAdversarial attackDefensive Deception 2019.06.21 2025.05.28 Literature Database
Misleading Authorship Attribution of Source Code using Adversarial Learning Authors: Erwin Quiring, Alwin Maier, Konrad Rieck | Published: 2019-05-29 | Updated: 2019-05-31 Attack EvaluationAdversarial attackAuthor Attribution Method 2019.05.29 2025.05.28 Literature Database
CopyCAT: Taking Control of Neural Policies with Constant Attacks Authors: Léonard Hussenot, Matthieu Geist, Olivier Pietquin | Published: 2019-05-29 | Updated: 2020-01-21 Effective Perturbation MethodsAdversarial attackDeep Learning 2019.05.29 2025.05.28 Literature Database
Expected Tight Bounds for Robust Training Authors: Salman Alsubaihi, Adel Bibi, Modar Alfadly, Abdullah Hamdi, Bernard Ghanem | Published: 2019-05-28 | Updated: 2021-06-12 Robustness Improvement MethodAdversarial attackDeep Learning 2019.05.28 2025.05.28 Literature Database
Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks Authors: Fatemeh Sheikholeslami, Swayambhoo Jain, Georgios B. Giannakis | Published: 2019-04-05 | Updated: 2020-10-15 Adversarial attackMachine Learning AlgorithmDeep Learning Method 2019.04.05 2025.05.28 Literature Database
White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks Authors: Yotam Gil, Yoav Chai, Or Gorodissky, Jonathan Berant | Published: 2019-04-04 Adversarial attackMachine Learning AlgorithmMachine Learning Application 2019.04.04 2025.05.28 Literature Database
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack Authors: Jianbo Chen, Michael I. Jordan, Martin J. Wainwright | Published: 2019-04-03 | Updated: 2020-04-28 Adversarial ExampleAdversarial attackDistance Evaluation Method 2019.04.03 2025.05.28 Literature Database
Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models Authors: Adith Boloor, Xin He, Christopher Gill, Yevgeniy Vorobeychik, Xuan Zhang | Published: 2019-03-12 Certified RobustnessAdversarial attackPhysical attack 2019.03.12 2025.05.28 Literature Database