GAT: Generative Adversarial Training for Adversarial Example Detection and Robust Classification Authors: Xuwang Yin, Soheil Kolouri, Gustavo K. Rohde | Published: 2019-05-27 | Updated: 2022-10-01 Binary ClassifierPoisoningAdversarial Example Detection 2019.05.27 2025.05.28 Literature Database
Provable robustness against all adversarial $l_p$-perturbations for $p\geq 1$ Authors: Francesco Croce, Matthias Hein | Published: 2019-05-27 | Updated: 2020-04-24 Multi-Class ClassificationVulnerability ManagementEvaluation Method 2019.05.27 2025.05.28 Literature Database
Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking Authors: Yunhan Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Zhenyu Zhong, Tao Wei | Published: 2019-05-27 | Updated: 2019-05-30 CybersecurityTracking MethodAdversarial Attack Methods 2019.05.27 2025.05.28 Literature Database
Non-Determinism in Neural Networks for Adversarial Robustness Authors: Daanish Ali Khan, Linhong Li, Ninghao Sha, Zhuoran Liu, Abelino Jimenez, Bhiksha Raj, Rita Singh | Published: 2019-05-26 PoisoningAdversarial ExampleAdversarial Example Detection 2019.05.26 2025.05.28 Literature Database
Robust Classification using Robust Feature Augmentation Authors: Kevin Eykholt, Swati Gupta, Atul Prakash, Amir Rahmati, Pratik Vaishnavi, Haizhong Zheng | Published: 2019-05-26 | Updated: 2019-09-18 Data Augmentation TechniquesGeneralization PerformanceMachine Learning Technology 2019.05.26 2025.05.28 Literature Database
Rearchitecting Classification Frameworks For Increased Robustness Authors: Varun Chandrasekaran, Brian Tang, Nicolas Papernot, Kassem Fawaz, Somesh Jha, Xi Wu | Published: 2019-05-26 | Updated: 2019-12-03 Robustness ImprovementGeneralization PerformanceAdversarial Example 2019.05.26 2025.05.28 Literature Database
Shredder: Learning Noise Distributions to Protect Inference Privacy Authors: Fatemehsadat Mireshghallah, Mohammadkazem Taram, Prakash Ramrakhyani, Dean Tullsen, Hadi Esmaeilzadeh | Published: 2019-05-26 | Updated: 2020-10-27 DNN IP Protection MethodPrivacy Protection MethodPrivacy Assessment 2019.05.26 2025.05.28 Literature Database
Generalizable Adversarial Attacks with Latent Variable Perturbation Modelling Authors: Avishek Joey Bose, Andre Cianflone, William L. Hamilton | Published: 2019-05-26 | Updated: 2020-01-20 Impact of GeneralizationAdversarial ExampleVulnerability of Adversarial Examples 2019.05.26 2025.05.28 Literature Database
Purifying Adversarial Perturbation with Adversarially Trained Auto-encoders Authors: Hebi Li, Qi Xiao, Shixin Tian, Jin Tian | Published: 2019-05-26 Attack TypeVulnerability of Adversarial ExamplesMachine Learning Method 2019.05.26 2025.05.28 Literature Database
Adversarial Distillation for Ordered Top-k Attacks Authors: Zekun Zhang, Tianfu Wu | Published: 2019-05-25 Adversarial ExampleVulnerability of Adversarial ExamplesMachine Learning Method 2019.05.25 2025.05.28 Literature Database