Non-Intrusive Detection of Adversarial Deep Learning Attacks via Observer Networks Authors: Kirthi Shankar Sivamani, Rajeev Sahay, Aly El Gamal | Published: 2020-02-22 Performance EvaluationAdversarial TrainingDefense Method 2020.02.22 2025.05.28 Literature Database
Improving the Tightness of Convex Relaxation Bounds for Training Certifiably Robust Classifiers Authors: Chen Zhu, Renkun Ni, Ping-yeh Chiang, Hengduo Li, Furong Huang, Tom Goldstein | Published: 2020-02-22 Robustness EvaluationOptimization ProblemRegularization 2020.02.22 2025.05.28 Literature Database
Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah | Published: 2020-02-22 | Updated: 2020-02-27 Performance EvaluationAdversarial ExampleAdversarial Training 2020.02.22 2025.05.28 Literature Database
Adversarial Attacks on Machine Learning Systems for High-Frequency Trading Authors: Micah Goldblum, Avi Schwarzschild, Ankit B. Patel, Tom Goldstein | Published: 2020-02-21 | Updated: 2021-10-29 Transaction Generation MethodAdversarial ExampleVulnerability Prediction 2020.02.21 2025.05.28 Literature Database
Robustness from Simple Classifiers Authors: Sharon Qian, Dimitris Kalimeris, Gal Kaplun, Yaron Singer | Published: 2020-02-21 Robustness EvaluationAdversarial TrainingDefense Method 2020.02.21 2025.05.28 Literature Database
Adversarial Detection and Correction by Matching Prediction Distributions Authors: Giovanni Vacanti, Arnaud Van Looveren | Published: 2020-02-21 Advice ProvisionAdversarial TrainingDefense Method 2020.02.21 2025.05.28 Literature Database
Black-Box Certification with Randomized Smoothing: A Functional Optimization Based Framework Authors: Dinghuai Zhang, Mao Ye, Chengyue Gong, Zhanxing Zhu, Qiang Liu | Published: 2020-02-21 | Updated: 2020-10-20 Robustness EvaluationOptimization ProblemDefense Method 2020.02.21 2025.05.28 Literature Database
Enhanced Adversarial Strategically-Timed Attacks against Deep Reinforcement Learning Authors: Chao-Han Huck Yang, Jun Qi, Pin-Yu Chen, Yi Ouyang, I-Te Danny Hung, Chin-Hui Lee, Xiaoli Ma | Published: 2020-02-20 Reward Mechanism DesignVulnerability PredictionDefense Method 2020.02.20 2025.05.28 Literature Database
A Bayes-Optimal View on Adversarial Examples Authors: Eitan Richardson, Yair Weiss | Published: 2020-02-20 | Updated: 2021-03-17 Robustness EvaluationAdversarial ExampleAdversarial Training 2020.02.20 2025.05.28 Literature Database
On the Decision Boundaries of Neural Networks: A Tropical Geometry Perspective Authors: Motasem Alfarra, Adel Bibi, Hasan Hammoud, Mohamed Gaafar, Bernard Ghanem | Published: 2020-02-20 | Updated: 2022-08-22 Robustness EvaluationAdversarial ExampleOptimization Problem 2020.02.20 2025.05.28 Literature Database