ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1909.10480
  4. Cited By
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained
  Environments

FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments

23 September 2019
Alesia Chernikova
Alina Oprea
    AAML
ArXivPDFHTML

Papers citing "FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments"

10 / 10 papers shown
Title
Model-agnostic clean-label backdoor mitigation in cybersecurity environments
Model-agnostic clean-label backdoor mitigation in cybersecurity environments
Giorgio Severi
Simona Boboila
J. Holodnak
K. Kratkiewicz
Rauf Izmailov
Alina Oprea
Alina Oprea
AAML
35
1
0
11 Jul 2024
Poisoning Network Flow Classifiers
Poisoning Network Flow Classifiers
Giorgio Severi
Simona Boboila
Alina Oprea
J. Holodnak
K. Kratkiewicz
J. Matterer
AAML
38
4
0
02 Jun 2023
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial
  Network Packet Generation
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation
Soumyadeep Hore
Jalal Ghadermazi
Diwas Paudel
Ankit Shah
Tapas K. Das
Nathaniel D. Bastian
AAML
17
13
0
18 May 2023
Learning Location from Shared Elevation Profiles in Fitness Apps: A
  Privacy Perspective
Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective
Ulku Meteriz-Yildiran
Necip Fazil Yildiran
Joongheon Kim
David A. Mohaisen
18
3
0
27 Oct 2022
On The Empirical Effectiveness of Unrealistic Adversarial Hardening
  Against Realistic Adversarial Attacks
On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks
Salijona Dyrmishi
Salah Ghamizi
Thibault Simonetto
Yves Le Traon
Maxime Cordy
AAML
26
16
0
07 Feb 2022
A Unified Framework for Adversarial Attack and Defense in Constrained
  Feature Space
A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space
Thibault Simonetto
Salijona Dyrmishi
Salah Ghamizi
Maxime Cordy
Yves Le Traon
AAML
21
21
0
02 Dec 2021
Modeling Realistic Adversarial Attacks against Network Intrusion
  Detection Systems
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems
Giovanni Apruzzese
M. Andreolini
Luca Ferretti
Mirco Marchetti
M. Colajanni
AAML
28
104
0
17 Jun 2021
A New Defense Against Adversarial Images: Turning a Weakness into a
  Strength
A New Defense Against Adversarial Images: Turning a Weakness into a Strength
Tao Yu
Shengyuan Hu
Chuan Guo
Wei-Lun Chao
Kilian Q. Weinberger
AAML
58
101
0
16 Oct 2019
Generating Natural Language Adversarial Examples
Generating Natural Language Adversarial Examples
M. Alzantot
Yash Sharma
Ahmed Elgohary
Bo-Jhang Ho
Mani B. Srivastava
Kai-Wei Chang
AAML
245
914
0
21 Apr 2018
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
287
5,837
0
08 Jul 2016
1