Literature Database

Robustness of Generalized Learning Vector Quantization Models against Adversarial Attacks

Authors: Sascha Saralajew, Lars Holdijk, Maike Rees, Thomas Villmann | Published: 2019-02-01 | Updated: 2019-03-09
Robustness Improvement
Adversarial attack
Deep Learning Technology

The Efficacy of SHIELD under Different Threat Models

Authors: Cory Cornelius, Nilaksh Das, Shang-Tse Chen, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2019-02-01 | Updated: 2019-08-02
Certified Robustness
Adversarial attack
Threat modeling

Robustness Certificates Against Adversarial Examples for ReLU Networks

Authors: Sahil Singla, Soheil Feizi | Published: 2019-02-01 | Updated: 2019-02-05
Robustness Improvement
Adversarial Example
Adversarial attack

Natural and Adversarial Error Detection using Invariance to Image Transformations

Authors: Yuval Bahat, Michal Irani, Gregory Shakhnarovich | Published: 2019-02-01
Data Curation
Certified Robustness
Robustness Improvement

Optimal Attack against Autoregressive Models by Manipulating the Environment

Authors: Yiding Chen, Xiaojin Zhu | Published: 2019-02-01 | Updated: 2019-12-01
MPC Algorithm
Adversarial attack
Optimization Problem

A New Family of Neural Networks Provably Resistant to Adversarial Attacks

Authors: Rakshit Agrawal, Luca de Alfaro, David Helmbold | Published: 2019-02-01
Adversarial Example
Adversarial Learning
Adversarial attack

Training Artificial Neural Networks by Generalized Likelihood Ratio Method: Exploring Brain-like Learning to Improve Robustness

Authors: Li Xiao, Yijie Peng, Jeff Hong, Zewu Ke, Shuhuai Yang | Published: 2019-01-31 | Updated: 2019-07-11
Robustness Improvement
Loss Term
Optimization Problem

CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks

Authors: Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique | Published: 2019-01-28 | Updated: 2019-05-24
Adversarial Example
Adversarial Perturbation Techniques
Adversarial attack

Utility Preserving Secure Private Data Release

Authors: Jasjeet Dhaliwal, Geoffrey So, Aleatha Parker-Wood, Melanie Beck | Published: 2019-01-28 | Updated: 2019-03-15
Randomization Method
Differential Privacy
Distance Recovery Algorithm

Do Not Return Similarity: Face Recovery with Distance

Authors: Mingtian Tan, Zhe Zhou | Published: 2019-01-28 | Updated: 2019-08-06
Causes of Information Leakage
Facial Recognition Technology
High-Dimensional Data Analysis