ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2101.08030
  4. Cited By
Adversarial Attacks for Tabular Data: Application to Fraud Detection and
  Imbalanced Data

Adversarial Attacks for Tabular Data: Application to Fraud Detection and Imbalanced Data

20 January 2021
F. Cartella
Orlando Anunciação
Yuki Funabiki
D. Yamaguchi
Toru Akishita
Olivier Elshocht
    AAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial Attacks for Tabular Data: Application to Fraud Detection and Imbalanced Data"

45 / 45 papers shown
CatBack: Universal Backdoor Attacks on Tabular Data via Categorical Encoding
CatBack: Universal Backdoor Attacks on Tabular Data via Categorical Encoding
Behrad Tajalli
Stefanos Koffas
S. Picek
AAML
140
0
0
08 Nov 2025
Boundary on the Table: Efficient Black-Box Decision-Based Attacks for Structured Data
Boundary on the Table: Efficient Black-Box Decision-Based Attacks for Structured Data
Roie Kazoom
Yuval Ratzabi
Etamar Rothstein
Ofer Hadar
AAMLLMTD
234
0
0
26 Sep 2025
Improving Credit Card Fraud Detection through Transformer-Enhanced GAN Oversampling
Improving Credit Card Fraud Detection through Transformer-Enhanced GAN Oversampling
Kashaf Ul Emaan
180
0
0
23 Sep 2025
Foe for Fraud: Transferable Adversarial Attacks in Credit Card Fraud Detection
Foe for Fraud: Transferable Adversarial Attacks in Credit Card Fraud Detection
Jan Lum Fok
Qingwen Zeng
Shiping Chen
Oscar Fawkes
H. Chen
AAML
135
3
0
20 Aug 2025
Beyond Vulnerabilities: A Survey of Adversarial Attacks as Both Threats and Defenses in Computer Vision Systems
Beyond Vulnerabilities: A Survey of Adversarial Attacks as Both Threats and Defenses in Computer Vision Systems
Zhongliang Guo
Shuai Zhao
Yanli Li
Weiye Li
Chun Tong Lei
Shuai Zhao
Lei Fang
Ognjen Arandjelović
Chun Pong Lau
AAML
275
6
0
03 Aug 2025
Data Leakage and Deceptive Performance: A Critical Examination of Credit Card Fraud Detection Methodologies
Data Leakage and Deceptive Performance: A Critical Examination of Credit Card Fraud Detection Methodologies
Khizar Hayat
Khizar Hayat
275
1
0
03 Jun 2025
MUSE: Model-Agnostic Tabular Watermarking via Multi-Sample Selection
MUSE: Model-Agnostic Tabular Watermarking via Multi-Sample Selection
Liancheng Fang
Aiwei Liu
Henry Peng Zou
Yankai Chen
Hengrui Zhang
Zhongfen Deng
Philip S. Yu
288
2
0
30 May 2025
Evaluating the Vulnerability of ML-Based Ethereum Phishing Detectors to Single-Feature Adversarial Perturbations
Evaluating the Vulnerability of ML-Based Ethereum Phishing Detectors to Single-Feature Adversarial Perturbations
Ahod Alghuried
Ali Alkinoon
Abdulaziz Alghamdi
Soohyeon Choi
Manar Mohaisen
David A. Mohaisen
AAML
180
0
0
24 Apr 2025
TabICL: A Tabular Foundation Model for In-Context Learning on Large Data
TabICL: A Tabular Foundation Model for In-Context Learning on Large Data
Jingang Qu
David Holzmüller
Gaël Varoquaux
Marine Le Morvan
LMTD
1.2K
99
0
08 Feb 2025
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular ClassifiersIEEE Symposium on Security and Privacy (S&P), 2024
Matan Ben-Tov
Daniel Deutch
Nave Frost
Mahmood Sharif
AAML
555
5
0
20 Jan 2025
Iterative Feature Exclusion Ranking for Deep Tabular Learning
Iterative Feature Exclusion Ranking for Deep Tabular Learning
Fathi Said Emhemed Shaninah
AbdulRahman M. A. Baraka
Mohd Halim Mohd Noor
LMTD
406
0
1
21 Dec 2024
TabularBench: Benchmarking Adversarial Robustness for Tabular Deep
  Learning in Real-world Use-cases
TabularBench: Benchmarking Adversarial Robustness for Tabular Deep Learning in Real-world Use-casesNeural Information Processing Systems (NeurIPS), 2024
Thibault Simonetto
Salah Ghamizi
Maxime Cordy
AAMLOODELM
252
9
0
14 Aug 2024
Simple Perturbations Subvert Ethereum Phishing Transactions Detection:
  An Empirical Analysis
Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical AnalysisWeb Information System and Application Conference (WISA), 2024
Ahod Alghureid
David Mohaisen
AAML
237
3
0
06 Aug 2024
Investigating Imperceptibility of Adversarial Attacks on Tabular Data:
  An Empirical Analysis
Investigating Imperceptibility of Adversarial Attacks on Tabular Data: An Empirical Analysis
Zhipeng He
Chun Ouyang
Laith Alzubaidi
Alistair Barros
Catarina Moreira
AAML
262
9
0
16 Jul 2024
Constrained Adaptive Attack: Effective Adversarial Attack Against Deep
  Neural Networks for Tabular Data
Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data
Thibault Simonetto
Salah Ghamizi
Maxime Cordy
AAMLOOD
286
10
0
02 Jun 2024
AuthNet: Neural Network with Integrated Authentication Logic
AuthNet: Neural Network with Integrated Authentication Logic
Yuling Cai
Fan Xiang
Guozhu Meng
Yinzhi Cao
Kai Chen
AAML
330
0
0
24 May 2024
Trustworthy Actionable Perturbations
Trustworthy Actionable PerturbationsInternational Conference on Machine Learning (ICML), 2024
Jesse Friedbaum
Sudarshan Adiga
Ravi Tandon
AAML
295
2
0
18 May 2024
MISLEAD: Manipulating Importance of Selected features for Learning
  Epsilon in Evasion Attack Deception
MISLEAD: Manipulating Importance of Selected features for Learning Epsilon in Evasion Attack Deception
Vidit Khazanchi
Pavan Kulkarni
Yuvaraj Govindarajulu
Manojkumar Somabhai Parmar
AAML
278
1
0
24 Apr 2024
Towards White Box Deep Learning
Towards White Box Deep Learning
Maciej Satkiewicz
AAML
529
1
0
14 Mar 2024
Constrained Adaptive Attacks: Realistic Evaluation of Adversarial
  Examples and Robust Training of Deep Neural Networks for Tabular Data
Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data
Thibault Simonetto
Salah Ghamizi
Antoine Desjardins
Maxime Cordy
Yves Le Traon
OODAAML
205
3
0
08 Nov 2023
GRANDE: Gradient-Based Decision Tree Ensembles for Tabular Data
GRANDE: Gradient-Based Decision Tree Ensembles for Tabular DataInternational Conference on Learning Representations (ICLR), 2023
Sascha Marton
Stefan Lüdtke
Christian Bartelt
Heiner Stuckenschmidt
LMTD
262
13
0
29 Sep 2023
Adversarial Attacks on Tables with Entity Swap
Adversarial Attacks on Tables with Entity Swap
A. Koleva
Martin Ringsquandl
Volker Tresp
AAML
253
3
0
15 Sep 2023
Designing an attack-defense game: how to increase robustness of
  financial transaction models via a competition
Designing an attack-defense game: how to increase robustness of financial transaction models via a competitionIndustrial Conference on Data Mining (IDM), 2023
Alexey Zaytsev
Alexey Natekin
Evgeni Vorsin
Valerii Smirnov
G. Smirnov
Oleg Sidorshin
Alexander Senin
Alexander Dudin
Dmitry Berestnev
AAML
220
2
0
22 Aug 2023
Adversarial training for tabular data with attack propagation
Adversarial training for tabular data with attack propagation
Tiago Leon Melo
Joao Bravo
Marco O. P. Sampaio
Paolo Romano
Hugo Ferreira
João Tiago Ascensão
P. Bizarro
AAML
196
2
0
28 Jul 2023
Adversarial Learning in Real-World Fraud Detection: Challenges and
  Perspectives
Adversarial Learning in Real-World Fraud Detection: Challenges and Perspectives
Daniele Lunghi
A. Simitsis
O. Caelen
Gianluca Bontempi
AAMLFaML
216
17
0
03 Jul 2023
Auditing and Generating Synthetic Data with Controllable Trust
  Trade-offs
Auditing and Generating Synthetic Data with Controllable Trust Trade-offsIEEE Journal on Emerging and Selected Topics in Circuits and Systems (JETCAS), 2023
Brian M. Belgodere
Pierre Dognin
Adam Ivankay
Igor Melnyk
Youssef Mroueh
...
Mattia Rigotti
Jerret Ross
Yair Schiff
Radhika Vedpathak
Richard A. Young
564
18
0
21 Apr 2023
Chaotic Variational Auto encoder-based Adversarial Machine Learning
Chaotic Variational Auto encoder-based Adversarial Machine LearningComputers & electrical engineering (Comput. Electr. Eng.), 2023
Pavan Venkata Sainadh Reddy
Yelleti Vivek
Gopi Pranay
V. Ravi
DRLAAML
285
5
0
25 Feb 2023
Asymmetric Certified Robustness via Feature-Convex Neural Networks
Asymmetric Certified Robustness via Feature-Convex Neural NetworksNeural Information Processing Systems (NeurIPS), 2023
Samuel Pfrommer
Brendon G. Anderson
Julien Piet
Somayeh Sojoudi
AAML
246
9
0
03 Feb 2023
TT-TFHE: a Torus Fully Homomorphic Encryption-Friendly Neural Network Architecture
TT-TFHE: a Torus Fully Homomorphic Encryption-Friendly Neural Network Architecture
Adrien Benamira
Tristan Guérand
Thomas Peyrin
Sayandeep Saha
321
8
0
03 Feb 2023
Towards Robustness of Text-to-SQL Models Against Natural and Realistic
  Adversarial Table Perturbation
Towards Robustness of Text-to-SQL Models Against Natural and Realistic Adversarial Table PerturbationAnnual Meeting of the Association for Computational Linguistics (ACL), 2022
Xinyu Pi
Bin Wang
Yan Gao
Jiaqi Guo
Zhoujun Li
Jian-Guang Lou
LMTD
231
40
0
20 Dec 2022
Towards Efficient and Domain-Agnostic Evasion Attack with
  High-dimensional Categorical Inputs
Towards Efficient and Domain-Agnostic Evasion Attack with High-dimensional Categorical InputsAAAI Conference on Artificial Intelligence (AAAI), 2022
Hongyan Bao
Yufei Han
Yujun Zhou
Xin Gao
Xiangliang Zhang
AAML
173
5
0
13 Dec 2022
Meta-Learning for Unsupervised Outlier Detection with Optimal Transport
Meta-Learning for Unsupervised Outlier Detection with Optimal TransportInternational Joint Conference on Artificial Intelligence (IJCAI), 2022
Prabhant Singh
Joaquin Vanschoren
OOD
312
8
0
01 Nov 2022
Class-Imbalanced Complementary-Label Learning via Weighted Loss
Class-Imbalanced Complementary-Label Learning via Weighted LossNeural Networks (NN), 2022
Meng Wei
Yong Zhou
Zhongnian Li
Xinzheng Xu
204
20
0
28 Sep 2022
Adversarial Robustness for Tabular Data through Cost and Utility
  Awareness
Adversarial Robustness for Tabular Data through Cost and Utility AwarenessNetwork and Distributed System Security Symposium (NDSS), 2022
Klim Kireev
B. Kulynych
Carmela Troncoso
AAML
408
26
0
27 Aug 2022
Statistical Detection of Adversarial examples in Blockchain-based
  Federated Forest In-vehicle Network Intrusion Detection Systems
Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection SystemsIEEE Access (IEEE Access), 2022
I. Aliyu
Sélinde Van Engelenburg
Muhammed Muazu
Jinsul Kim
C. Lim
AAML
183
20
0
11 Jul 2022
(De-)Randomized Smoothing for Decision Stump Ensembles
(De-)Randomized Smoothing for Decision Stump EnsemblesNeural Information Processing Systems (NeurIPS), 2022
Miklós Z. Horváth
Mark Niklas Muller
Marc Fischer
Martin Vechev
311
5
0
27 May 2022
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial
  Training
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial TrainingIEEE transactions on computers (IEEE Trans. Comput.), 2022
Kento Hasegawa
Seira Hidano
Kohei Nozawa
S. Kiyomoto
N. Togawa
204
41
0
27 May 2022
On The Empirical Effectiveness of Unrealistic Adversarial Hardening
  Against Realistic Adversarial Attacks
On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial AttacksIEEE Symposium on Security and Privacy (IEEE S&P), 2022
Salijona Dyrmishi
Salah Ghamizi
Thibault Simonetto
Yves Le Traon
Maxime Cordy
AAML
231
23
0
07 Feb 2022
GenLabel: Mixup Relabeling using Generative Models
GenLabel: Mixup Relabeling using Generative ModelsInternational Conference on Machine Learning (ICML), 2022
Jy-yong Sohn
Liang Shang
Hongxu Chen
Jaekyun Moon
Dimitris Papailiopoulos
Kangwook Lee
VLM
240
14
0
07 Jan 2022
Bi-Discriminator Class-Conditional Tabular GAN
Bi-Discriminator Class-Conditional Tabular GANPattern Recognition Letters (PR), 2021
Mohammad Esmaeilpour
Nourhene Chaalia
Adel Abusitta
François-Xavier Devailly
Wissem Maazoun
P. Cardinal
235
17
0
12 Nov 2021
Deep Neural Networks and Tabular Data: A Survey
Deep Neural Networks and Tabular Data: A Survey
V. Borisov
Tobias Leemann
Kathrin Seßler
Johannes Haug
Martin Pawelczyk
Gjergji Kasneci
LMTD
618
1,040
0
05 Oct 2021
When and How to Fool Explainable Models (and Humans) with Adversarial
  Examples
When and How to Fool Explainable Models (and Humans) with Adversarial Examples
Jon Vadillo
Roberto Santana
Jose A. Lozano
SILMAAML
307
24
0
05 Jul 2021
Feature Importance Guided Attack: A Model Agnostic Adversarial Attack
Feature Importance Guided Attack: A Model Agnostic Adversarial Attack
Gilad Gressel
Niranjan Hegde
A. Sreekumar
Rishikumar Radhakrishnan
Kalyani Harikumar
Michael C. Darling
Krishnashree Achuthan
AAML
302
22
0
28 Jun 2021
Exploring Counterfactual Explanations Through the Lens of Adversarial
  Examples: A Theoretical and Empirical Analysis
Exploring Counterfactual Explanations Through the Lens of Adversarial Examples: A Theoretical and Empirical AnalysisInternational Conference on Artificial Intelligence and Statistics (AISTATS), 2021
Martin Pawelczyk
Chirag Agarwal
Shalmali Joshi
Sohini Upadhyay
Himabindu Lakkaraju
AAML
178
65
0
18 Jun 2021
The Intriguing Relation Between Counterfactual Explanations and
  Adversarial Examples
The Intriguing Relation Between Counterfactual Explanations and Adversarial ExamplesMinds and Machines (MM), 2020
Timo Freiesleben
GAN
560
74
0
11 Sep 2020
1
Page 1 of 1