Deep Learning for Launching and Mitigating Wireless Jamming Attacks Authors: Tugba Erpek, Yalin E. Sagduyu, Yi Shi | Published: 2018-07-03 | Updated: 2018-12-13 Training Data GenerationAdversarial attackDefense Method 2018.07.03 2025.05.28 Literature Database
Delving into adversarial attacks on deep policies Authors: Jernej Kos, Dawn Song | Published: 2017-05-18 Certified RobustnessRobustnessDefense Method 2017.05.18 2025.05.28 Literature Database
Extending Defensive Distillation Authors: Nicolas Papernot, Patrick McDaniel | Published: 2017-05-15 RobustnessAdversarial ExampleDefense Method 2017.05.15 2025.05.28 Literature Database