Detecting Potential Local Adversarial Examples for Human-Interpretable Defense Authors: Xavier Renard, Thibault Laugel, Marie-Jeanne Lesot, Christophe Marsala, Marcin Detyniecki | Published: 2018-09-07 2018.09.07 2025.04.03 文献データベース
Are adversarial examples inevitable? Authors: Ali Shafahi, W. Ronny Huang, Christoph Studer, Soheil Feizi, Tom Goldstein | Published: 2018-09-06 | Updated: 2020-02-03 2018.09.06 2025.04.03 文献データベース
IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection Authors: Zilong Lin, Yong Shi, Zhi Xue | Published: 2018-09-06 | Updated: 2022-05-08 2018.09.06 2025.04.03 文献データベース
Adversarial Reprogramming of Text Classification Neural Networks Authors: Paarth Neekhara, Shehzeen Hussain, Shlomo Dubnov, Farinaz Koushanfar | Published: 2018-09-06 | Updated: 2019-08-15 2018.09.06 2025.04.03 文献データベース
Bridging machine learning and cryptography in defence against adversarial attacks Authors: Olga Taran, Shideh Rezaeifar, Slava Voloshynovskiy | Published: 2018-09-05 2018.09.05 2025.04.03 文献データベース
Adversarial Attacks on Node Embeddings via Graph Poisoning Authors: Aleksandar Bojchevski, Stephan Günnemann | Published: 2018-09-04 | Updated: 2019-05-27 2018.09.04 2025.04.03 文献データベース
HASP: A High-Performance Adaptive Mobile Security Enhancement Against Malicious Speech Recognition Authors: Zirui Xu, Fuxun Yu, Chenchen Liu, Xiang Chen | Published: 2018-09-04 2018.09.04 2025.04.03 文献データベース
IoTDots: A Digital Forensics Framework for Smart Environments Authors: Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac | Published: 2018-09-03 2018.09.03 2025.04.03 文献データベース
Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques Authors: Dorjan Hitaj, Luigi V. Mancini | Published: 2018-09-03 2018.09.03 2025.04.03 文献データベース
Adversarial Attack Type I: Cheat Classifiers by Significant Changes Authors: Sanli Tang, Xiaolin Huang, Mingjian Chen, Chengjin Sun, Jie Yang | Published: 2018-09-03 | Updated: 2019-07-22 2018.09.03 2025.04.03 文献データベース