ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2011.01183
  4. Cited By
Adversarial Examples in Constrained Domains
v1v2v3 (latest)

Adversarial Examples in Constrained Domains

2 November 2020
Ryan Sheatsley
Nicolas Papernot
Mike Weisman
Gunjan Verma
Patrick McDaniel
    AAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial Examples in Constrained Domains"

13 / 13 papers shown
Insights on Adversarial Attacks for Tabular Machine Learning via a Systematic Literature Review
Insights on Adversarial Attacks for Tabular Machine Learning via a Systematic Literature Review
Salijona Dyrmishi
Mohamed Djilani
Thibault Simonetto
Salah Ghamizi
Maxime Cordy
AAMLLMTD
310
2
0
18 Jun 2025
Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability
Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability
Anass Grini
Oumaima Taheri
Btissam El Khamlichi
Amal El Fallah-Seghrouchni
AAML
304
1
0
02 May 2025
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular ClassifiersIEEE Symposium on Security and Privacy (S&P), 2024
Matan Ben-Tov
Daniel Deutch
Nave Frost
Mahmood Sharif
AAML
555
5
0
20 Jan 2025
How to Train your Antivirus: RL-based Hardening through the
  Problem-Space
How to Train your Antivirus: RL-based Hardening through the Problem-Space
Jacopo Cortellazzi
Ilias Tsingenopoulos
B. Bosanský
Simone Aonzo
Davy Preuveneers
Wouter Joosen
Fabio Pierazzi
Lorenzo Cavallaro
248
7
0
29 Feb 2024
Untargeted White-box Adversarial Attack with Heuristic Defence Methods
  in Real-time Deep Learning based Network Intrusion Detection System
Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection SystemComputer Communications (Comput. Commun.), 2023
Khushnaseeb Roshan
Aasim Zafar
Sheikh Burhan Ul Haque
AAML
493
66
0
05 Oct 2023
A Novel Deep Learning based Model to Defend Network Intrusion Detection
  System against Adversarial Attacks
A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial AttacksInternational Conference on Computing for Sustainable Global Development (ICCSGD), 2023
Khushnaseeb Roshan
Aasim Zafar
Shiekh Burhan Ul Haque
AAML
224
17
0
31 Jul 2023
The Space of Adversarial Strategies
The Space of Adversarial Strategies
Ryan Sheatsley
Blaine Hoak
Eric Pauley
Patrick McDaniel
AAML
261
6
0
09 Sep 2022
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN
B. Zolbayar
Ryan Sheatsley
Patrick McDaniel
Mike Weisman
Sencun Zhu
Shitong Zhu
S. Krishnamurthy
GANAAML
202
29
0
13 Mar 2022
On The Empirical Effectiveness of Unrealistic Adversarial Hardening
  Against Realistic Adversarial Attacks
On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial AttacksIEEE Symposium on Security and Privacy (IEEE S&P), 2022
Salijona Dyrmishi
Salah Ghamizi
Thibault Simonetto
Yves Le Traon
Maxime Cordy
AAML
236
23
0
07 Feb 2022
A Unified Framework for Adversarial Attack and Defense in Constrained
  Feature Space
A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space
Thibault Simonetto
Salijona Dyrmishi
Salah Ghamizi
Maxime Cordy
Yves Le Traon
AAML
283
32
0
02 Dec 2021
On the Robustness of Domain Constraints
On the Robustness of Domain ConstraintsConference on Computer and Communications Security (CCS), 2021
Ryan Sheatsley
Blaine Hoak
Eric Pauley
Yohan Beugin
Mike Weisman
Patrick McDaniel
AAMLOOD
314
34
0
18 May 2021
Packet-Level Adversarial Network Traffic Crafting using Sequence Generative Adversarial Networks
Qiumei Cheng
Shiying Zhou
Yi Shen
Dezhang Kong
Chunming Wu
GAN
223
21
0
08 Mar 2021
Adversarial Machine Learning in Network Intrusion Detection Systems
Adversarial Machine Learning in Network Intrusion Detection Systems
Elie Alhajjar
P. Maxwell
Nathaniel D. Bastian
GANSILMAAML
257
181
0
23 Apr 2020
1
Page 1 of 1