ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1909.10480
  4. Cited By
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained
  Environments
v1v2v3v4 (latest)

FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments

23 September 2019
Alesia Chernikova
Alina Oprea
    AAML
ArXiv (abs)PDFHTML

Papers citing "FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments"

16 / 16 papers shown
Title
Insights on Adversarial Attacks for Tabular Machine Learning via a Systematic Literature Review
Insights on Adversarial Attacks for Tabular Machine Learning via a Systematic Literature Review
Salijona Dyrmishi
Mohamed Djilani
Thibault Simonetto
Salah Ghamizi
Maxime Cordy
AAMLLMTD
34
0
0
18 Jun 2025
On the Robustness of Tabular Foundation Models: Test-Time Attacks and In-Context Defenses
On the Robustness of Tabular Foundation Models: Test-Time Attacks and In-Context Defenses
Mohamed Djilani
Thibault Simonetto
Karim Tit
Florian Tambon
Paul Récamier
Salah Ghamizi
Maxime Cordy
Mike Papadakis
AAML
40
0
0
03 Jun 2025
Improving Adversarial Robustness in Android Malware Detection by
  Reducing the Impact of Spurious Correlations
Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious Correlations
Hamid Bostani
Zhengyu Zhao
Veelasha Moonsamy
AAML
60
0
0
27 Aug 2024
TabularBench: Benchmarking Adversarial Robustness for Tabular Deep
  Learning in Real-world Use-cases
TabularBench: Benchmarking Adversarial Robustness for Tabular Deep Learning in Real-world Use-cases
Thibault Simonetto
Salah Ghamizi
Maxime Cordy
AAMLOODELM
93
4
0
14 Aug 2024
Model-agnostic clean-label backdoor mitigation in cybersecurity environments
Model-agnostic clean-label backdoor mitigation in cybersecurity environments
Giorgio Severi
Simona Boboila
J. Holodnak
K. Kratkiewicz
Rauf Izmailov
Alina Oprea
Alina Oprea
AAML
81
1
0
11 Jul 2024
Constrained Adaptive Attack: Effective Adversarial Attack Against Deep
  Neural Networks for Tabular Data
Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data
Thibault Simonetto
Salah Ghamizi
Maxime Cordy
AAMLOOD
82
5
0
02 Jun 2024
Problem space structural adversarial attacks for Network Intrusion
  Detection Systems based on Graph Neural Networks
Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks
Andrea Venturi
Dario Stabili
Mirco Marchetti
AAML
62
1
0
18 Mar 2024
Constrained Adaptive Attacks: Realistic Evaluation of Adversarial
  Examples and Robust Training of Deep Neural Networks for Tabular Data
Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data
Thibault Simonetto
Salah Ghamizi
Antoine Desjardins
Maxime Cordy
Yves Le Traon
OODAAML
59
3
0
08 Nov 2023
Poisoning Network Flow Classifiers
Poisoning Network Flow Classifiers
Giorgio Severi
Simona Boboila
Alina Oprea
J. Holodnak
K. Kratkiewicz
J. Matterer
AAML
58
4
0
02 Jun 2023
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial
  Network Packet Generation
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation
Soumyadeep Hore
Jalal Ghadermazi
Diwas Paudel
Ankit Shah
Tapas K. Das
Nathaniel D. Bastian
AAML
54
14
0
18 May 2023
A Mutation-based Text Generation for Adversarial Machine Learning
  Applications
A Mutation-based Text Generation for Adversarial Machine Learning Applications
Jesus Guerrero
G. Liang
I. Alsmadi
DeLMOMedIm
59
1
0
21 Dec 2022
Learning Location from Shared Elevation Profiles in Fitness Apps: A
  Privacy Perspective
Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective
Ulku Meteriz-Yildiran
Necip Fazil Yildiran
Joongheon Kim
David A. Mohaisen
36
4
0
27 Oct 2022
On The Empirical Effectiveness of Unrealistic Adversarial Hardening
  Against Realistic Adversarial Attacks
On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks
Salijona Dyrmishi
Salah Ghamizi
Thibault Simonetto
Yves Le Traon
Maxime Cordy
AAML
84
20
0
07 Feb 2022
A Unified Framework for Adversarial Attack and Defense in Constrained
  Feature Space
A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space
Thibault Simonetto
Salijona Dyrmishi
Salah Ghamizi
Maxime Cordy
Yves Le Traon
AAML
74
25
0
02 Dec 2021
Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the
  Age of AI-NIDS
Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the Age of AI-NIDS
Christian Schroeder de Witt
Yongchao Huang
Philip Torr
Martin Strohmeier
AAML
66
3
0
23 Nov 2021
Modeling Realistic Adversarial Attacks against Network Intrusion
  Detection Systems
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems
Giovanni Apruzzese
M. Andreolini
Luca Ferretti
Mirco Marchetti
M. Colajanni
AAML
97
109
0
17 Jun 2021
1