Improving Robustness of Malware Classifiers using Adversarial Strings Generated from Perturbed Latent Representations Oct 22, 2021 Adversarial Attack
— Unverified 0Improving Robustness of Task Oriented Dialog Systems Nov 12, 2019 Adversarial Attack Data Augmentation
— Unverified 0ODE guided Neural Data Augmentation Techniques for Time Series Data and its Benefits on Robustness Oct 15, 2019 Adversarial Attack Data Augmentation
— Unverified 0Improving the JPEG-resistance of Adversarial Attacks on Face Recognition by Interpolation Smoothing Feb 26, 2024 Adversarial Attack Face Recognition
— Unverified 0Improving the Transferability of Adversarial Examples by Inverse Knowledge Distillation Feb 24, 2025 Adversarial Attack Diversity
— Unverified 0Improving the Transferability of Adversarial Attacks on Face Recognition with Beneficial Perturbation Feature Augmentation Oct 28, 2022 Adversarial Attack Face Recognition
— Unverified 0Improving Transferable Targeted Adversarial Attack via Normalized Logit Calibration and Truncated Feature Mixing May 10, 2024 Adversarial Attack
— Unverified 0Improving Visual Quality and Transferability of Adversarial Attacks on Face Recognition Simultaneously with Adversarial Restoration Sep 4, 2023 Adversarial Attack Face Recognition
— Unverified 0Improving Visual Quality of Unrestricted Adversarial Examples with Wavelet-VAE Aug 25, 2021 Adversarial Attack
— Unverified 0Influence Based Defense Against Data Poisoning Attacks in Online Learning Apr 24, 2021 Adversarial Attack Data Poisoning
— Unverified 0"Influence Sketching": Finding Influential Samples In Large-Scale Regressions Nov 17, 2016 Adversarial Attack Malware Detection
— Unverified 0Information Importance-Aware Defense against Adversarial Attack for Automatic Modulation Classification:An XAI-Based Approach Oct 15, 2024 Adversarial Attack Classification
— Unverified 0Inline Detection of DGA Domains Using Side Information Mar 12, 2020 Adversarial Attack
— Unverified 0Input Hessian Regularization of Neural Networks Sep 14, 2020 Adversarial Attack
— Unverified 0Input-Specific and Universal Adversarial Attack Generation for Spiking Neural Networks in the Spiking Domain May 7, 2025 Adversarial Attack Decision Making
— Unverified 0Input-specific Attention Subnetworks for Adversarial Detection Nov 16, 2021 Adversarial Attack
— Unverified 0Input-specific Attention Subnetworks for Adversarial Detection Mar 23, 2022 Adversarial Attack
— Unverified 0Intermediate Level Adversarial Attack for Enhanced Transferability Nov 20, 2018 Adversarial Attack
— Unverified 0Intermediate Outputs Are More Sensitive Than You Think Dec 1, 2024 Adversarial Attack Sensitivity
— Unverified 0Internal Wasserstein Distance for Adversarial Attack and Defense Mar 13, 2021 Adversarial Attack Adversarial Defense
— Unverified 0Interpolation between CNNs and ResNets Jan 1, 2020 Adversarial Attack image-classification
— Unverified 0Interpreting and Evaluating Neural Network Robustness May 10, 2019 Adversarial Attack
— Unverified 0Interpreting Hidden Semantics in the Intermediate Layers of 3D Point Cloud Classification Neural Network Mar 12, 2023 3D Point Cloud Classification Adversarial Attack
— Unverified 0Discovering Failure Modes of Text-guided Diffusion Models via Adversarial Search Jun 1, 2023 Adversarial Attack Efficient Exploration
— Unverified 0MF-CLIP: Leveraging CLIP as Surrogate Models for No-box Adversarial Attacks Jul 13, 2023 Adversarial Attack Attribute
— Unverified 0Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems Nov 8, 2019 Adversarial Attack Intrusion Detection
— Unverified 0Exploring the Robustness of NMT Systems to Nonsensical Inputs Aug 3, 2019 Adversarial Attack Decoder
— Unverified 0Investigating Decision Boundaries of Trained Neural Networks Aug 7, 2019 Adversarial Attack
— Unverified 0Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization Oct 30, 2019 Adversarial Attack Intrusion Detection
— Unverified 0Investigating the significance of adversarial attacks and their relation to interpretability for radar-based human activity recognition systems Jan 26, 2021 Activity Recognition Adversarial Attack
— Unverified 0Investigating Vulnerability to Adversarial Examples on Multimodal Data Fusion in Deep Learning May 22, 2020 Adversarial Attack Adversarial Robustness
— Unverified 0I See Dead People: Gray-Box Adversarial Attack on Image-To-Text Models Jun 13, 2023 Adversarial Attack Decoder
— Unverified 0Learning Task-aware Robust Deep Learning Systems Oct 11, 2020 Adversarial Attack Deep Learning
— Unverified 0Is It Time to Redefine the Classification Task for Deep Learning Systems? Jun 18, 2021 Adversarial Attack Classification
— Unverified 0Isolated and Ensemble Audio Preprocessing Methods for Detecting Adversarial Examples against Automatic Speech Recognition Sep 11, 2018 Adversarial Attack Automatic Speech Recognition
— Unverified 0Iterative Adversarial Attack on Image-guided Story Ending Generation May 16, 2023 Adversarial Attack Adversarial Robustness
— Unverified 0ITPatch: An Invisible and Triggered Physical Adversarial Patch against Traffic Sign Recognition Sep 19, 2024 Adversarial Attack Traffic Sign Recognition
— Unverified 0Adversarial Rain Attack and Defensive Deraining for DNN Perception Sep 19, 2020 Adversarial Attack Autonomous Driving
— Unverified 0JailbreakHunter: A Visual Analytics Approach for Jailbreak Prompts Discovery from Large-Scale Human-LLM Conversational Datasets Jul 3, 2024 Adversarial Attack Semantic Similarity
— Unverified 0Jailbreaking GPT-4V via Self-Adversarial Attacks with System Prompts Nov 15, 2023 Adversarial Attack Red Teaming
— Unverified 0Jailbreaking Prompt Attack: A Controllable Adversarial Attack against Diffusion Models Apr 2, 2024 Adversarial Attack Image Generation
— Unverified 0Jitter Does Matter: Adapting Gaze Estimation to New Domains Oct 5, 2022 Adversarial Attack Contrastive Learning
— Unverified 0Just One Moment: Structural Vulnerability of Deep Action Recognition against One Frame Attack Nov 30, 2020 Action Recognition Adversarial Attack
— Unverified 0Keep on Swimming: Real Attackers Only Need Partial Knowledge of a Multi-Model System Oct 30, 2024 Adversarial Attack
— Unverified 0KoDF: A Large-scale Korean DeepFake Detection Dataset Mar 18, 2021 Adversarial Attack DeepFake Detection
— Unverified 0Label Smoothing and Adversarial Robustness Sep 17, 2020 Adversarial Attack Adversarial Robustness
— Unverified 0LanCe: A Comprehensive and Lightweight CNN Defense Methodology against Physical Adversarial Attacks on Embedded Multimedia Applications Oct 17, 2019 Adversarial Attack
— Unverified 0Large-Scale Adversarial Attacks on Graph Neural Networks via Graph Coarsening Sep 29, 2021 Adversarial Attack
— Unverified 0Latent Magic: An Investigation into Adversarial Examples Crafted in the Semantic Latent Space May 22, 2023 Adversarial Attack SSIM
— Unverified 0LEA2: A Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions Jan 1, 2023 Adversarial Attack
— Unverified 0