FGAN: Federated Generative Adversarial Networks for Anomaly Detection in Network Traffic Authors: Sankha Das | Published: 2022-03-21 Model CommunicationIntrusion Detection SystemGenerative Adversarial Network 2022.03.21 2025.05.28 Literature Database
Learning Image Attacks toward Vision Guided Autonomous Vehicles Authors: Hyung-Jin Yoon, Hamidreza Jafarnejadsani, Petros Voulgaris | Published: 2021-05-09 | Updated: 2021-05-17 Adversarial Attack MethodsState Estimation MethodGenerative Adversarial Network 2021.05.09 2025.05.28 Literature Database
Double-Adversarial Activation Anomaly Detection: Adversarial Autoencoders are Anomaly Generators Authors: J. -P. Schulze, P. Sperl, K. Böttinger | Published: 2021-01-12 | Updated: 2024-01-14 Performance EvaluationMachine Learning MethodGenerative Adversarial Network 2021.01.12 2025.05.28 Literature Database
Generating Natural Adversarial Hyperspectral examples with a modified Wasserstein GAN Authors: Jean-Christophe Burnel, Kilian Fatras, Nicolas Courty | Published: 2020-01-27 Data Generation MethodAdversarial ExampleGenerative Adversarial Network 2020.01.27 2025.05.28 Literature Database
HRFA: High-Resolution Feature-based Attack Authors: Zhixing Ye, Sizhe Chen, Peidong Zhang, Chengjin Sun, Xiaolin Huang | Published: 2020-01-21 | Updated: 2020-10-22 Adversarial ExampleAdversarial Attack DetectionGenerative Adversarial Network 2020.01.21 2025.05.28 Literature Database
Defending Neural Backdoors via Generative Distribution Modeling Authors: Ximing Qiao, Yukun Yang, Hai Li | Published: 2019-10-10 | Updated: 2019-11-06 Backdoor AttackAttack EvaluationGenerative Adversarial Network 2019.10.10 2025.05.28 Literature Database
Membership Model Inversion Attacks for Deep Networks Authors: Samyadeep Basu, Rauf Izmailov, Chris Mesterharm | Published: 2019-10-09 Attack EvaluationAttackers and Malicious DevicesGenerative Adversarial Network 2019.10.09 2025.05.28 Literature Database
Adversarial Learning of Deepfakes in Accounting Authors: Marco Schreyer, Timur Sattarov, Bernd Reimer, Damian Borth | Published: 2019-10-09 Data Integrity ConstraintsAdversarial Attack MethodsGenerative Adversarial Network 2019.10.09 2025.05.28 Literature Database
Perturbations are not Enough: Generating Adversarial Examples with Spatial Distortions Authors: He Zhao, Trung Le, Paul Montague, Olivier De Vel, Tamas Abraham, Dinh Phung | Published: 2019-10-03 Adversarial ExampleAdversarial Attack MethodsGenerative Adversarial Network 2019.10.03 2025.05.28 Literature Database
GAMIN: An Adversarial Approach to Black-Box Model Inversion Authors: Ulrich Aïvodji, Sébastien Gambs, Timon Ther | Published: 2019-09-26 PoisoningTaxonomy of AttacksGenerative Adversarial Network 2019.09.26 2025.05.28 Literature Database