Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2011.01183
Cited By
Adversarial Examples in Constrained Domains
2 November 2020
Ryan Sheatsley
Nicolas Papernot
Mike Weisman
Gunjan Verma
Patrick McDaniel
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Adversarial Examples in Constrained Domains"
7 / 7 papers shown
Title
Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability
Anass Grini
Oumaima Taheri
Btissam El Khamlichi
Amal El Fallah-Seghrouchni
AAML
49
0
0
02 May 2025
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers
Matan Ben-Tov
Daniel Deutch
Nave Frost
Mahmood Sharif
AAML
114
0
0
20 Jan 2025
A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks
Khushnaseeb Roshan
Aasim Zafar
Shiekh Burhan Ul Haque
AAML
8
8
0
31 Jul 2023
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN
B. Zolbayar
Ryan Sheatsley
Patrick McDaniel
Mike Weisman
Sencun Zhu
Shitong Zhu
S. Krishnamurthy
GAN
AAML
17
14
0
13 Mar 2022
On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks
Salijona Dyrmishi
Salah Ghamizi
Thibault Simonetto
Yves Le Traon
Maxime Cordy
AAML
32
16
0
07 Feb 2022
A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space
Thibault Simonetto
Salijona Dyrmishi
Salah Ghamizi
Maxime Cordy
Yves Le Traon
AAML
24
21
0
02 Dec 2021
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
308
5,842
0
08 Jul 2016
1