Deep Leakage from Gradients Authors: Ligeng Zhu, Zhijian Liu, Song Han | Published: 2019-06-21 | Updated: 2019-12-19 Privacy ProtectionAdversarial attackDefensive Deception 2019.06.21 2025.05.28 Literature Database
Misleading Authorship Attribution of Source Code using Adversarial Learning Authors: Erwin Quiring, Alwin Maier, Konrad Rieck | Published: 2019-05-29 | Updated: 2019-05-31 Attack EvaluationAdversarial attackAuthor Attribution Method 2019.05.29 2025.05.28 Literature Database
CopyCAT: Taking Control of Neural Policies with Constant Attacks Authors: Léonard Hussenot, Matthieu Geist, Olivier Pietquin | Published: 2019-05-29 | Updated: 2020-01-21 Effective Perturbation MethodsAdversarial attackDeep Learning 2019.05.29 2025.05.28 Literature Database
Expected Tight Bounds for Robust Training Authors: Salman Alsubaihi, Adel Bibi, Modar Alfadly, Abdullah Hamdi, Bernard Ghanem | Published: 2019-05-28 | Updated: 2021-06-12 Robustness Improvement MethodAdversarial attackDeep Learning 2019.05.28 2025.05.28 Literature Database
Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks Authors: Fatemeh Sheikholeslami, Swayambhoo Jain, Georgios B. Giannakis | Published: 2019-04-05 | Updated: 2020-10-15 Adversarial attackMachine Learning AlgorithmDeep Learning Method 2019.04.05 2025.05.28 Literature Database
White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks Authors: Yotam Gil, Yoav Chai, Or Gorodissky, Jonathan Berant | Published: 2019-04-04 Adversarial attackMachine Learning AlgorithmMachine Learning Application 2019.04.04 2025.05.28 Literature Database
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack Authors: Jianbo Chen, Michael I. Jordan, Martin J. Wainwright | Published: 2019-04-03 | Updated: 2020-04-28 Adversarial ExampleAdversarial attackDistance Evaluation Method 2019.04.03 2025.05.28 Literature Database
Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models Authors: Adith Boloor, Xin He, Christopher Gill, Yevgeniy Vorobeychik, Xuan Zhang | Published: 2019-03-12 Certified RobustnessAdversarial attackPhysical attack 2019.03.12 2025.05.28 Literature Database
A Little Is Enough: Circumventing Defenses For Distributed Learning Authors: Moran Baruch, Gilad Baruch, Yoav Goldberg | Published: 2019-02-16 Adversarial LearningAdversarial attackAdversarial Attack Methods 2019.02.16 2025.05.28 Literature Database
Mitigation of Adversarial Examples in RF Deep Classifiers Utilizing AutoEncoder Pre-training Authors: Silvija Kokalj-Filipovic, Rob Miller, Nicholas Chang, Chi Leung Lau | Published: 2019-02-16 PoisoningAdversarial attackAdversarial Attack Methods 2019.02.16 2025.05.28 Literature Database