Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks Authors: Qi Liu, Tao Liu, Zihao Liu, Yanzhi Wang, Yier Jin, Wujie Wen | Published: 2018-02-14 | Updated: 2018-03-19 Certified RobustnessAdversarial ExampleAdversarial attack 2018.02.14 2025.05.28 Literature Database
Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection Authors: Andrea Paudice, Luis Muñoz-González, Andras Gyorgy, Emil C. Lupu | Published: 2018-02-08 PoisoningAdversarial attackDetection of Poisonous Data 2018.02.08 2025.05.28 Literature Database
A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines Authors: Rui Zhang, Quanyan Zhu | Published: 2018-02-07 Multi-Objective OptimizationAdversarial attackMachine Learning Method 2018.02.07 2025.05.28 Literature Database
Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach Authors: Tsui-Wei Weng, Huan Zhang, Pin-Yu Chen, Jinfeng Yi, Dong Su, Yupeng Gao, Cho-Jui Hsieh, Luca Daniel | Published: 2018-01-31 Certified RobustnessRobustness EvaluationAdversarial attack 2018.01.31 2025.05.28 Literature Database
Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning Authors: Hyrum S. Anderson, Anant Kharkar, Bobby Filar, David Evans, Phil Roth | Published: 2018-01-26 | Updated: 2018-01-30 Reinforcement Learning MethodAdversarial attackMachine Learning Method 2018.01.26 2025.05.28 Literature Database
Sparsity-based Defense against Adversarial Attacks on Linear Classifiers Authors: Zhinus Marzi, Soorya Gopalakrishnan, Upamanyu Madhow, Ramtin Pedarsani | Published: 2018-01-15 | Updated: 2018-06-19 Sparsity DefenseAdversarial LearningAdversarial attack 2018.01.15 2025.05.28 Literature Database
LatentPoison – Adversarial Attacks On The Latent Space Authors: Antonia Creswell, Anil A. Bharath, Biswa Sengupta | Published: 2017-11-08 PoisoningCertified RobustnessAdversarial attack 2017.11.08 2025.05.28 Literature Database
Intriguing Properties of Adversarial Examples Authors: Ekin D. Cubuk, Barret Zoph, Samuel S. Schoenholz, Quoc V. Le | Published: 2017-11-08 Adversarial ExampleAdversarial LearningAdversarial attack 2017.11.08 2025.05.28 Literature Database