Trade-offs and Guarantees of Adversarial Representation Learning for Information Obfuscation Authors: Han Zhao, Jianfeng Chi, Yuan Tian, Geoffrey J. Gordon | Published: 2019-06-19 | Updated: 2020-10-25 2019.06.19 2025.05.13 Literature Database
Poisoning Attacks with Generative Adversarial Nets Authors: Luis Muñoz-González, Bjarne Pfitzner, Matteo Russo, Javier Carnerero-Cano, Emil C. Lupu | Published: 2019-06-18 | Updated: 2019-09-25 2019.06.18 2025.05.13 Literature Database
On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks Authors: Masoumeh Shafieinejad, Jiaqi Wang, Nils Lukas, Xinda Li, Florian Kerschbaum | Published: 2019-06-18 | Updated: 2019-11-26 2019.06.18 2025.05.13 Literature Database
Measuring Bias in Contextualized Word Representations Authors: Keita Kurita, Nidhi Vyas, Ayush Pareek, Alan W Black, Yulia Tsvetkov | Published: 2019-06-18 2019.06.18 2025.05.13 Literature Database
Improving Black-box Adversarial Attacks with a Transfer-based Prior Authors: Shuyu Cheng, Yinpeng Dong, Tianyu Pang, Hang Su, Jun Zhu | Published: 2019-06-17 | Updated: 2020-07-26 2019.06.17 2025.05.13 Literature Database
Membership Privacy for Machine Learning Models Through Knowledge Transfer Authors: Virat Shejwalkar, Amir Houmansadr | Published: 2019-06-15 | Updated: 2020-12-31 2019.06.15 2025.05.13 Literature Database
Real-Time Privacy-Preserving Data Release for Smart Meters Authors: Mohammadhadi Shateri, Francisco Messina, Pablo Piantanida, Fabrice Labeau | Published: 2019-06-14 | Updated: 2021-11-25 2019.06.14 2025.05.13 Literature Database
Towards Stable and Efficient Training of Verifiably Robust Neural Networks Authors: Huan Zhang, Hongge Chen, Chaowei Xiao, Sven Gowal, Robert Stanforth, Bo Li, Duane Boning, Cho-Jui Hsieh | Published: 2019-06-14 | Updated: 2019-11-27 2019.06.14 2025.05.13 Literature Database
Copy and Paste: A Simple But Effective Initialization Method for Black-Box Adversarial Attacks Authors: Thomas Brunner, Frederik Diehl, Alois Knoll | Published: 2019-06-14 | Updated: 2019-12-29 2019.06.14 2025.05.13 Literature Database
Adversarial Robustness Assessment: Why both $L_0$ and $L_\infty$ Attacks Are Necessary Authors: Shashank Kotyan, Danilo Vasconcellos Vargas | Published: 2019-06-14 | Updated: 2020-07-16 2019.06.14 2025.05.13 Literature Database