GANG-MAM: GAN based enGine for Modifying Android Malware Authors: Renjith G, Sonia Laudanna, Aji S, Corrado Aaron Visaggio, Vinod P | Published: 2021-09-27 ソフトウェアセキュリティマルウェア検出手法敵対的攻撃 2021.09.27 2025.04.03 文献データベース
Adversarial Transfer Attacks With Unknown Data and Class Overlap Authors: Luke E. Richards, André Nguyen, Ryan Capps, Steven Forsythe, Cynthia Matuszek, Edward Raff | Published: 2021-09-23 | Updated: 2021-09-24 ポイズニングロバスト性敵対的攻撃 2021.09.23 2025.04.03 文献データベース
Attacks on Visualization-Based Malware Detection: Balancing Effectiveness and Executability Authors: Hadjer Benkraouda, Jingyu Qian, Hung Quoc Tran, Berkay Kaplan | Published: 2021-09-21 マルウェア検出手法敵対的サンプル敵対的攻撃 2021.09.21 2025.04.03 文献データベース
Towards Resilient Artificial Intelligence: Survey and Research Issues Authors: Oliver Eigner, Sebastian Eresheim, Peter Kieseberg, Lukas Daniel Klausner, Martin Pirker, Torsten Priebe, Simon Tjoa, Fiammetta Marulli, Francesco Mercaldo | Published: 2021-09-18 ロバスト性将来の研究敵対的攻撃 2021.09.18 2025.04.03 文献データベース
EVAGAN: Evasion Generative Adversarial Network for Low Data Regimes Authors: Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Husnain Rafiq | Published: 2021-09-14 | Updated: 2022-08-06 データ生成性能評価敵対的攻撃 2021.09.14 2025.04.03 文献データベース
Dodging Attack Using Carefully Crafted Natural Makeup Authors: Nitzan Guetta, Asaf Shabtai, Inderjeet Singh, Satoru Momiyama, Yuval Elovici | Published: 2021-09-14 メイクアップ攻撃敵対的攻撃顔認識システム 2021.09.14 2025.04.03 文献データベース
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers Authors: Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek | Published: 2021-07-30 | Updated: 2022-03-06 バックドア攻撃敵対的攻撃音声認識システムのセキュリティ 2021.07.30 2025.04.03 文献データベース
When and How to Fool Explainable Models (and Humans) with Adversarial Examples Authors: Jon Vadillo, Roberto Santana, Jose A. Lozano | Published: 2021-07-05 | Updated: 2023-07-07 モデルの解釈性敵対的サンプル敵対的攻撃 2021.07.05 2025.04.03 文献データベース
Robust Stochastic Linear Contextual Bandits Under Adversarial Attacks Authors: Qin Ding, Cho-Jui Hsieh, James Sharpnack | Published: 2021-06-05 | Updated: 2023-01-30 データ汚染検出敵対的攻撃脆弱性評価手法 2021.06.05 2025.04.03 文献データベース
Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks Authors: Ramy Maarouf, Danish Sattar, Ashraf Matrawy | Published: 2021-05-30 ポイズニング敵対的攻撃脆弱性評価手法 2021.05.30 2025.04.03 文献データベース