Towards Query Efficient Black-box Attacks: An Input-free Perspective Authors: Yali Du, Meng Fang, Jinfeng Yi, Jun Cheng, Dacheng Tao | Published: 2018-09-09 2018.09.09 2025.04.03 文献データベース
Structure-Preserving Transformation: Generating Diverse and Transferable Adversarial Examples Authors: Dan Peng, Zizhan Zheng, Xiaofeng Zhang | Published: 2018-09-08 | Updated: 2018-12-22 2018.09.08 2025.04.03 文献データベース
Detecting Potential Local Adversarial Examples for Human-Interpretable Defense Authors: Xavier Renard, Thibault Laugel, Marie-Jeanne Lesot, Christophe Marsala, Marcin Detyniecki | Published: 2018-09-07 2018.09.07 2025.04.03 文献データベース
Are adversarial examples inevitable? Authors: Ali Shafahi, W. Ronny Huang, Christoph Studer, Soheil Feizi, Tom Goldstein | Published: 2018-09-06 | Updated: 2020-02-03 2018.09.06 2025.04.03 文献データベース
IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection Authors: Zilong Lin, Yong Shi, Zhi Xue | Published: 2018-09-06 | Updated: 2022-05-08 2018.09.06 2025.04.03 文献データベース
Adversarial Reprogramming of Text Classification Neural Networks Authors: Paarth Neekhara, Shehzeen Hussain, Shlomo Dubnov, Farinaz Koushanfar | Published: 2018-09-06 | Updated: 2019-08-15 2018.09.06 2025.04.03 文献データベース
Bridging machine learning and cryptography in defence against adversarial attacks Authors: Olga Taran, Shideh Rezaeifar, Slava Voloshynovskiy | Published: 2018-09-05 2018.09.05 2025.04.03 文献データベース
Adversarial Attacks on Node Embeddings via Graph Poisoning Authors: Aleksandar Bojchevski, Stephan Günnemann | Published: 2018-09-04 | Updated: 2019-05-27 2018.09.04 2025.04.03 文献データベース
HASP: A High-Performance Adaptive Mobile Security Enhancement Against Malicious Speech Recognition Authors: Zirui Xu, Fuxun Yu, Chenchen Liu, Xiang Chen | Published: 2018-09-04 2018.09.04 2025.04.03 文献データベース
IoTDots: A Digital Forensics Framework for Smart Environments Authors: Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac | Published: 2018-09-03 2018.09.03 2025.04.03 文献データベース