Literature Database

GAT: Generative Adversarial Training for Adversarial Example Detection and Robust Classification

Authors: Xuwang Yin, Soheil Kolouri, Gustavo K. Rohde | Published: 2019-05-27 | Updated: 2022-10-01
Binary Classifier
Poisoning
Adversarial Example Detection

Provable robustness against all adversarial $l_p$-perturbations for $p\geq 1$

Authors: Francesco Croce, Matthias Hein | Published: 2019-05-27 | Updated: 2020-04-24
Multi-Class Classification
Vulnerability Management
Evaluation Method

Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking

Authors: Yunhan Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Zhenyu Zhong, Tao Wei | Published: 2019-05-27 | Updated: 2019-05-30
Cybersecurity
Tracking Method
Adversarial Attack Methods

Non-Determinism in Neural Networks for Adversarial Robustness

Authors: Daanish Ali Khan, Linhong Li, Ninghao Sha, Zhuoran Liu, Abelino Jimenez, Bhiksha Raj, Rita Singh | Published: 2019-05-26
Poisoning
Adversarial Example
Adversarial Example Detection

Robust Classification using Robust Feature Augmentation

Authors: Kevin Eykholt, Swati Gupta, Atul Prakash, Amir Rahmati, Pratik Vaishnavi, Haizhong Zheng | Published: 2019-05-26 | Updated: 2019-09-18
Data Augmentation Techniques
Generalization Performance
Machine Learning Technology

Rearchitecting Classification Frameworks For Increased Robustness

Authors: Varun Chandrasekaran, Brian Tang, Nicolas Papernot, Kassem Fawaz, Somesh Jha, Xi Wu | Published: 2019-05-26 | Updated: 2019-12-03
Robustness Improvement
Generalization Performance
Adversarial Example

Shredder: Learning Noise Distributions to Protect Inference Privacy

Authors: Fatemehsadat Mireshghallah, Mohammadkazem Taram, Prakash Ramrakhyani, Dean Tullsen, Hadi Esmaeilzadeh | Published: 2019-05-26 | Updated: 2020-10-27
DNN IP Protection Method
Privacy Protection Method
Privacy Assessment

Generalizable Adversarial Attacks with Latent Variable Perturbation Modelling

Authors: Avishek Joey Bose, Andre Cianflone, William L. Hamilton | Published: 2019-05-26 | Updated: 2020-01-20
Impact of Generalization
Adversarial Example
Vulnerability of Adversarial Examples

Purifying Adversarial Perturbation with Adversarially Trained Auto-encoders

Authors: Hebi Li, Qi Xiao, Shixin Tian, Jin Tian | Published: 2019-05-26
Attack Type
Vulnerability of Adversarial Examples
Machine Learning Method

Adversarial Distillation for Ordered Top-k Attacks

Authors: Zekun Zhang, Tianfu Wu | Published: 2019-05-25
Adversarial Example
Vulnerability of Adversarial Examples
Machine Learning Method