AIセキュリティポータルbot

Do Wider Neural Networks Really Help Adversarial Robustness?

Authors: Boxi Wu, Jinghui Chen, Deng Cai, Xiaofei He, Quanquan Gu | Published: 2020-10-03 | Updated: 2021-08-14
Robustness Evaluation
Adversarial Example
Deep Learning Technology

CorrAttack: Black-box Adversarial Attack with Structured Search

Authors: Zhichao Huang, Yaowei Huang, Tong Zhang | Published: 2020-10-03
Robustness Evaluation
Deep Learning Method
Feature Selection Method

Query complexity of adversarial attacks

Authors: Grzegorz Głuch, Rüdiger Urbanke | Published: 2020-10-02 | Updated: 2021-02-10
Robustness Evaluation
Deep Learning Method
Computational Complexity

An alternative proof of the vulnerability of retrieval in high intrinsic dimensionality neighborhood

Authors: Teddy Furon | Published: 2020-10-02 | Updated: 2022-05-20
Data Management System
Robustness Evaluation
Image Processing

Deep learning for time series classification

Authors: Hassan Ismail Fawaz | Published: 2020-10-01
Model Architecture
Adversarial Example
Deep Learning Method

Bag of Tricks for Adversarial Training

Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu | Published: 2020-10-01 | Updated: 2021-03-31
Model Architecture
Robustness Improvement Method
Optimization Methods

Erratum Concerning the Obfuscated Gradients Attack on Stochastic Activation Pruning

Authors: Guneet S. Dhillon, Nicholas Carlini | Published: 2020-09-30
Watermarking
Robustness Improvement Method
Attack Evaluation

DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles

Authors: Huanrui Yang, Jingyang Zhang, Hongliang Dong, Nathan Inkawhich, Andrew Gardner, Andrew Touchet, Wesley Wilkes, Heath Berry, Hai Li | Published: 2020-09-30 | Updated: 2020-10-18
Robustness Improvement Method
Adversarial Example
Vulnerability Assessment Method

Uncertainty-Matching Graph Neural Networks to Defend Against Poisoning Attacks

Authors: Uday Shankar Shanthamallu, Jayaraman J. Thiagarajan, Andreas Spanias | Published: 2020-09-30
Graph Neural Network
Poisoning
Content Specialized for Toxicity Attacks

StratLearner: Learning a Strategy for Misinformation Prevention in Social Networks

Authors: Guangmo Tong | Published: 2020-09-29
Graph Construction
Information Extraction
Optimization Methods