PDA: Progressive Data Augmentation for General Robustness of Deep Neural Networks Authors: Hang Yu, Aishan Liu, Xianglong Liu, Gengchao Li, Ping Luo, Ran Cheng, Jichen Yang, Chongzhi Zhang | Published: 2019-09-11 | Updated: 2020-02-24 ポイズニングモデルの堅牢性攻撃手法 2019.09.11 2025.04.03 文献データベース
When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures Authors: Gil Fidel, Ron Bitton, Asaf Shabtai | Published: 2019-09-08 ポイズニング敵対的サンプル敵対的サンプルの検知 2019.09.08 2025.04.03 文献データベース
Spatiotemporally Constrained Action Space Attacks on Deep Reinforcement Learning Agents Authors: Xian Yeow Lee, Sambit Ghadai, Kai Liang Tan, Chinmay Hegde, Soumik Sarkar | Published: 2019-09-05 | Updated: 2019-11-19 ポイズニング攻撃パターン抽出敵対的訓練 2019.09.05 2025.04.03 文献データベース
Metric Learning for Adversarial Robustness Authors: Chengzhi Mao, Ziyuan Zhong, Junfeng Yang, Carl Vondrick, Baishakhi Ray | Published: 2019-09-03 | Updated: 2019-10-28 ポイズニング学習の改善敵対的サンプルの脆弱性 2019.09.03 2025.04.03 文献データベース
Universal, transferable and targeted adversarial attacks Authors: Junde Wu, Rao Fu | Published: 2019-08-29 | Updated: 2022-06-13 ポイズニング敵対的サンプル敵対的攻撃検出 2019.08.29 2025.04.03 文献データベース
Transferring Robustness for Graph Neural Network Against Poisoning Attacks Authors: Xianfeng Tang, Yandong Li, Yiwei Sun, Huaxiu Yao, Prasenjit Mitra, Suhang Wang | Published: 2019-08-20 | Updated: 2020-02-26 ポイズニング堅牢性向上手法毒性攻撃に特化した内容 2019.08.20 2025.04.03 文献データベース
Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses Authors: Xiao Wang, Siyue Wang, Pin-Yu Chen, Yanzhi Wang, Brian Kulis, Xue Lin, Peter Chin | Published: 2019-08-20 ポイズニング堅牢性向上手法敵対的攻撃手法 2019.08.20 2025.04.03 文献データベース
On Defending Against Label Flipping Attacks on Malware Detection Systems Authors: Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti | Published: 2019-08-13 | Updated: 2020-06-16 ポイズニング敵対的攻撃手法計算複雑性 2019.08.13 2025.04.03 文献データベース
On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method Authors: Pu Zhao, Sijia Liu, Pin-Yu Chen, Nghia Hoang, Kaidi Xu, Bhavya Kailkhura, Xue Lin | Published: 2019-07-26 | Updated: 2019-12-04 ポイズニング効果的な摂動手法敵対的移転性 2019.07.26 2025.04.03 文献データベース
Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics Authors: Yuxin Ma, Tiankai Xie, Jundong Li, Ross Maciejewski | Published: 2019-07-17 | Updated: 2019-10-03 バックドア攻撃ポイズニング敵対的攻撃手法 2019.07.17 2025.04.03 文献データベース