Defending against Whitebox Adversarial Attacks via Randomized Discretization Authors: Yuchen Zhang, Percy Liang | Published: 2019-03-25 2019.03.25 2025.05.13 Literature Database
Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness Authors: Jörn-Henrik Jacobsen, Jens Behrmannn, Nicholas Carlini, Florian Tramèr, Nicolas Papernot | Published: 2019-03-25 2019.03.25 2025.05.13 Literature Database
The LogBarrier adversarial attack: making effective use of decision boundary information Authors: Chris Finlay, Aram-Alexandre Pooladian, Adam M. Oberman | Published: 2019-03-25 2019.03.25 2025.05.13 Literature Database
Robust Neural Networks using Randomized Adversarial Training Authors: Alexandre Araujo, Laurent Meunier, Rafael Pinot, Benjamin Negrevergne | Published: 2019-03-25 | Updated: 2020-02-13 2019.03.25 2025.05.13 Literature Database
Data Poisoning against Differentially-Private Learners: Attacks and Defenses Authors: Yuzhe Ma, Xiaojin Zhu, Justin Hsu | Published: 2019-03-23 | Updated: 2019-07-05 2019.03.23 2025.05.13 Literature Database
Improving Adversarial Robustness via Guided Complement Entropy Authors: Hao-Yun Chen, Jhao-Hong Liang, Shih-Chieh Chang, Jia-Yu Pan, Yu-Ting Chen, Wei Wei, Da-Cheng Juan | Published: 2019-03-23 | Updated: 2019-08-07 2019.03.23 2025.05.13 Literature Database
A Unified Analytical Framework for Trustable Machine Learning and Automation Running with Blockchain Authors: Tao Wang | Published: 2019-03-21 2019.03.21 2025.05.13 Literature Database
Contextual Bandits with Random Projection Authors: Xiaotian Yu | Published: 2019-03-20 2019.03.20 2025.05.13 Literature Database
On the Robustness of Deep K-Nearest Neighbors Authors: Chawin Sitawarin, David Wagner | Published: 2019-03-20 2019.03.20 2025.05.13 Literature Database
An Evaluation of Bitcoin Address Classification based on Transaction History Summarization Authors: Yu-Jing Lin, Po-Wei Wu, Cheng-Han Hsu, I-Ping Tu, Shih-wei Liao | Published: 2019-03-19 2019.03.19 2025.05.13 Literature Database