Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the Age of AI-NIDS Authors: Christian Schroeder de Witt, Yongchao Huang, Philip H. S. Torr, Martin Strohmeier | Published: 2021-11-23 Reinforcement LearningAdversarial attackDeep Reinforcement Learning 2021.11.23 2025.05.28 Literature Database
A Comparison of State-of-the-Art Techniques for Generating Adversarial Malware Binaries Authors: Prithviraj Dasgupta, Zachariah Osman | Published: 2021-11-22 Malware Detection MethodAdversarial attackMalware Detection with Limited Samples 2021.11.22 2025.05.28 Literature Database
Evaluating Adversarial Attacks on ImageNet: A Reality Check on Misclassification Classes Authors: Utku Ozbulak, Maura Pintor, Arnout Van Messem, Wesley De Neve | Published: 2021-11-22 PoisoningAdversarial ExampleAdversarial attack 2021.11.22 2025.05.28 Literature Database
Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Model Authors: Alon Zolfi, Shai Avidan, Yuval Elovici, Asaf Shabtai | Published: 2021-11-21 | Updated: 2022-09-07 Impact of GeneralizationAdversarial attackFace Recognition System 2021.11.21 2025.05.28 Literature Database
Fooling Adversarial Training with Inducing Noise Authors: Zhirui Wang, Yifei Wang, Yisen Wang | Published: 2021-11-19 Training Data GenerationPoisoningAdversarial attack 2021.11.19 2025.05.28 Literature Database
A Review of Adversarial Attack and Defense for Classification Methods Authors: Yao Li, Minhao Cheng, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-11-18 Adversarial ExampleAdversarial attackDefense Mechanism 2021.11.18 2025.05.28 Literature Database
Enhanced Membership Inference Attacks against Machine Learning Models Authors: Jiayuan Ye, Aadyaa Maddi, Sasi Kumar Murakonda, Vincent Bindschaedler, Reza Shokri | Published: 2021-11-18 | Updated: 2022-09-13 PoisoningMembership InferenceAdversarial attack 2021.11.18 2025.05.28 Literature Database
Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks Authors: Kaleel Mahmood, Rigel Mahmood, Ethan Rathbun, Marten van Dijk | Published: 2021-09-29 Backdoor AttackPoisoningAdversarial attack 2021.09.29 2025.05.28 Literature Database
GANG-MAM: GAN based enGine for Modifying Android Malware Authors: Renjith G, Sonia Laudanna, Aji S, Corrado Aaron Visaggio, Vinod P | Published: 2021-09-27 Software SecurityMalware Detection MethodAdversarial attack 2021.09.27 2025.05.28 Literature Database
Adversarial Transfer Attacks With Unknown Data and Class Overlap Authors: Luke E. Richards, André Nguyen, Ryan Capps, Steven Forsythe, Cynthia Matuszek, Edward Raff | Published: 2021-09-23 | Updated: 2021-09-24 PoisoningRobustnessAdversarial attack 2021.09.23 2025.05.28 Literature Database