Resilient Active Information Gathering with Mobile Robots Authors: Brent Schlotfeldt, Vasileios Tzoumas, Dinesh Thakur, George J. Pappas | Published: 2018-03-26 | Updated: 2018-09-02 Process EnvironmentRobot ControlCommunication Efficiency 2018.03.26 2025.05.13 Literature Database
On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples Authors: Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu | Published: 2018-03-26 Adversarial Example DetectionAdversarial Perturbation TechniquesMachine Learning Technology 2018.03.26 2025.05.13 Literature Database
Clipping free attacks against artificial neural networks Authors: Boussad Addad, Jerome Kodjabachian, Christophe Meyer | Published: 2018-03-26 | Updated: 2018-03-28 Adversarial Example DetectionAdversarial Perturbation TechniquesMachine Learning Technology 2018.03.26 2025.05.13 Literature Database
Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Joung Woo Ryu | Published: 2018-03-24 Exploratory AttackAdversarial Perturbation TechniquesMachine Learning Technology 2018.03.24 2025.05.13 Literature Database
A Dynamic-Adversarial Mining Approach to the Security of Machine Learning Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Lingyu Lyua, Jiashun Chen | Published: 2018-03-24 Model Extraction AttackDetection of Model Extraction AttacksAdversarial Learning 2018.03.24 2025.05.13 Literature Database
Datasheets for Datasets Authors: Timnit Gebru, Jamie Morgenstern, Briana Vecchione, Jennifer Wortman Vaughan, Hanna Wallach, Hal Daumé III, Kate Crawford | Published: 2018-03-23 | Updated: 2021-12-01 Data CurationData Management SystemPrivacy Assessment 2018.03.23 2025.05.13 Literature Database
Improving DNN Robustness to Adversarial Attacks using Jacobian Regularization Authors: Daniel Jakubovitz, Raja Giryes | Published: 2018-03-23 | Updated: 2019-05-28 Certified RobustnessAdversarial LearningRegularization 2018.03.23 2025.05.13 Literature Database
Robust Blind Deconvolution via Mirror Descent Authors: Sathya N. Ravi, Ronak Mehta, Vikas Singh | Published: 2018-03-21 Robustness AnalysisConvergence PropertyMachine Learning Method 2018.03.21 2025.05.13 Literature Database
Adversarial Defense based on Structure-to-Signal Autoencoders Authors: Joachim Folz, Sebastian Palacio, Joern Hees, Damian Borth, Andreas Dengel | Published: 2018-03-21 PoisoningAdversarial LearningImage Feature Extraction 2018.03.21 2025.05.13 Literature Database
Resilient Monotone Sequential Maximization Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-03-21 | Updated: 2020-12-16 Resource Consumption AnalysisReinforcement Learning AlgorithmMachine Learning Method 2018.03.21 2025.05.13 Literature Database