Adversarial Boot Camp: label free certified robustness in one epoch Authors: Ryan Campbell, Chris Finlay, Adam M Oberman | Published: 2020-10-05 2020.10.05 2025.05.28 Literature Database
Understanding Catastrophic Overfitting in Single-step Adversarial Training Authors: Hoki Kim, Woojin Lee, Jaewook Lee | Published: 2020-10-05 | Updated: 2020-12-15 2020.10.05 2025.05.28 Literature Database
Lipschitz Bounded Equilibrium Networks Authors: Max Revay, Ruigang Wang, Ian R. Manchester | Published: 2020-10-05 2020.10.05 2025.05.28 Literature Database
A Generative Machine Learning Approach to Policy Optimization in Pursuit-Evasion Games Authors: Shiva Navabi, Osonde A. Osoba | Published: 2020-10-04 | Updated: 2020-10-13 2020.10.04 2025.05.28 Literature Database
DNS Covert Channel Detection via Behavioral Analysis: a Machine Learning Approach Authors: Salvatore Saeli, Federica Bisio, Pierangelo Lombardo, Danilo Massa | Published: 2020-10-04 2020.10.04 2025.05.28 Literature Database
Data Analytics-enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets Authors: Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed | Published: 2020-10-04 2020.10.04 2025.05.28 Literature Database
Multi-Step Adversarial Perturbations on Recommender Systems Embeddings Authors: Vito Walter Anelli, Alejandro Bellogín, Yashar Deldjoo, Tommaso Di Noia, Felice Antonio Merra | Published: 2020-10-03 2020.10.03 2025.05.28 Literature Database
Do Wider Neural Networks Really Help Adversarial Robustness? Authors: Boxi Wu, Jinghui Chen, Deng Cai, Xiaofei He, Quanquan Gu | Published: 2020-10-03 | Updated: 2021-08-14 2020.10.03 2025.05.28 Literature Database
CorrAttack: Black-box Adversarial Attack with Structured Search Authors: Zhichao Huang, Yaowei Huang, Tong Zhang | Published: 2020-10-03 2020.10.03 2025.05.28 Literature Database
Query complexity of adversarial attacks Authors: Grzegorz Głuch, Rüdiger Urbanke | Published: 2020-10-02 | Updated: 2021-02-10 2020.10.02 2025.05.28 Literature Database