Explainability and Adversarial Robustness for RNNs Authors: Alexander Hartl, Maximilian Bachl, Joachim Fabini, Tanja Zseby | Published: 2019-12-20 | Updated: 2020-02-19 Taxonomy of AttacksAdversarial LearningEffectiveness Analysis of Defense Methods 2019.12.20 2025.05.28 Literature Database
A Survey of Black-Box Adversarial Attacks on Computer Vision Models Authors: Siddhant Bhambri, Sumanyu Muku, Avinash Tulasi, Arun Balaji Buduru | Published: 2019-12-03 | Updated: 2020-02-07 PoisoningVulnerability of Adversarial ExamplesEffectiveness Analysis of Defense Methods 2019.12.03 2025.05.28 Literature Database
One Man’s Trash is Another Man’s Treasure: Resisting Adversarial Examples by Adversarial Examples Authors: Chang Xiao, Changxi Zheng | Published: 2019-11-25 | Updated: 2019-11-27 Adversarial ExampleAdversarial Attack MethodsEffectiveness Analysis of Defense Methods 2019.11.25 2025.05.28 Literature Database
Attack on Grid Event Cause Analysis: An Adversarial Machine Learning Approach Authors: Iman Niazazari, Hanif Livani | Published: 2019-11-19 | Updated: 2019-11-25 Adversarial ExampleAdversarial Attack MethodsEffectiveness Analysis of Defense Methods 2019.11.19 2025.05.28 Literature Database
Can You Really Backdoor Federated Learning? Authors: Ziteng Sun, Peter Kairouz, Ananda Theertha Suresh, H. Brendan McMahan | Published: 2019-11-18 | Updated: 2019-12-02 Adversarial Attack MethodsThreat ModelEffectiveness Analysis of Defense Methods 2019.11.18 2025.05.28 Literature Database
Defending Against Model Stealing Attacks with Adaptive Misinformation Authors: Sanjay Kariyappa, Moinuddin K Qureshi | Published: 2019-11-16 Adversarial ExampleAdversarial Attack MethodsEffectiveness Analysis of Defense Methods 2019.11.16 2025.05.28 Literature Database
MadNet: Using a MAD Optimization for Defending Against Adversarial Attacks Authors: Shai Rozenberg, Gal Elidan, Ran El-Yaniv | Published: 2019-11-03 | Updated: 2020-06-12 Attack MethodAdversarial ExampleEffectiveness Analysis of Defense Methods 2019.11.03 2025.05.28 Literature Database
Reducing audio membership inference attack accuracy to chance: 4 defenses Authors: Michael Lomnitz, Nina Lopatina, Paul Gamble, Zigfried Hampel-Arias, Lucas Tindall, Felipe A. Mejia, Maria Alejandra Barrios | Published: 2019-10-31 Privacy ManagementAttack MethodEffectiveness Analysis of Defense Methods 2019.10.31 2025.05.28 Literature Database
MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection Authors: Anuj Dubey, Rosario Cammarota, Aydin Aysu | Published: 2019-10-29 | Updated: 2019-12-02 Membership InferenceAttack MethodEffectiveness Analysis of Defense Methods 2019.10.29 2025.05.28 Literature Database
Understanding and Quantifying Adversarial Examples Existence in Linear Classification Authors: Xupeng Shi, A. Adam Ding | Published: 2019-10-27 Adversarial ExampleLinear ModelEffectiveness Analysis of Defense Methods 2019.10.27 2025.05.28 Literature Database