A Generative Machine Learning Approach to Policy Optimization in Pursuit-Evasion Games Authors: Shiva Navabi, Osonde A. Osoba | Published: 2020-10-04 | Updated: 2020-10-13 Online Decision MakingGame TheoryDeep Learning 2020.10.04 2025.05.28 Literature Database
Adversarial Robustness of Stabilized NeuralODEs Might be from Obfuscated Gradients Authors: Yifei Huang, Yaodong Yu, Hongyang Zhang, Yi Ma, Yuan Yao | Published: 2020-09-28 | Updated: 2021-06-02 PoisoningRelationship between Robustness and PrivacyDeep Learning 2020.09.28 2025.05.28 Literature Database
Beneficial Perturbations Network for Defending Adversarial Examples Authors: Shixian Wen, Amanda Rios, Laurent Itti | Published: 2020-09-27 | Updated: 2021-09-13 Adversarial ExampleVulnerability of Adversarial ExamplesDeep Learning 2020.09.27 2025.05.28 Literature Database
Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning Authors: Yinghua Zhang, Yangqiu Song, Jian Liang, Kun Bai, Qiang Yang | Published: 2020-08-25 PoisoningAdversarial LearningDeep Learning 2020.08.25 2025.05.28 Literature Database
Multiple Classification with Split Learning Authors: Jongwon Kim, Sungho Shin, Yeonguk Yu, Junseok Lee, Kyoobin Lee | Published: 2020-08-22 | Updated: 2020-09-11 Reconstruction AttackDeep LearningDeep Learning Method 2020.08.22 2025.05.28 Literature Database
NoPeek: Information leakage reduction to share activations in distributed deep learning Authors: Praneeth Vepakomma, Abhishek Singh, Otkrist Gupta, Ramesh Raskar | Published: 2020-08-20 Information Leakage AnalysisAdversarial ExampleDeep Learning 2020.08.20 2025.05.28 Literature Database
Towards adversarial robustness with 01 loss neural networks Authors: Yunzhe Xue, Meiyan Xie, Usman Roshan | Published: 2020-08-20 Adversarial Spectrum Attack DetectionDeep LearningComputational Complexity 2020.08.20 2025.05.28 Literature Database
GraphReach: Position-Aware Graph Neural Network using Reachability Estimations Authors: Sunil Nishad, Shubhangi Agarwal, Arnab Bhattacharya, Sayan Ranu | Published: 2020-08-19 | Updated: 2021-08-20 Graph TransformationDeep LearningDeep Learning Method 2020.08.19 2025.05.28 Literature Database
Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-07-31 PoisoningAttack MethodDeep Learning 2020.07.31 2025.05.28 Literature Database
Black-box Adversarial Sample Generation Based on Differential Evolution Authors: Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang | Published: 2020-07-30 Attack MethodDeep LearningResearch Methodology 2020.07.30 2025.05.28 Literature Database