Literature Database

Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness

Authors: Jörn-Henrik Jacobsen, Jens Behrmannn, Nicholas Carlini, Florian Tramèr, Nicolas Papernot | Published: 2019-03-25
Certified Robustness
Vulnerability of Adversarial Examples
Adversarial Attack Detection

The LogBarrier adversarial attack: making effective use of decision boundary information

Authors: Chris Finlay, Aram-Alexandre Pooladian, Adam M. Oberman | Published: 2019-03-25
Certified Robustness
Effective Perturbation Methods
Adversarial Learning

Robust Neural Networks using Randomized Adversarial Training

Authors: Alexandre Araujo, Laurent Meunier, Rafael Pinot, Benjamin Negrevergne | Published: 2019-03-25 | Updated: 2020-02-13
Certified Robustness
Adversarial Learning
Adversarial Attack Detection

Data Poisoning against Differentially-Private Learners: Attacks and Defenses

Authors: Yuzhe Ma, Xiaojin Zhu, Justin Hsu | Published: 2019-03-23 | Updated: 2019-07-05
Detection of Poison Data for Backdoor Attacks
Adversarial Attack Detection
Untargeted Toxicity Attack

Improving Adversarial Robustness via Guided Complement Entropy

Authors: Hao-Yun Chen, Jhao-Hong Liang, Shih-Chieh Chang, Jia-Yu Pan, Yu-Ting Chen, Wei Wei, Da-Cheng Juan | Published: 2019-03-23 | Updated: 2019-08-07
Robust Optimization
Adversarial Learning
Adversarial Attack Detection

A Unified Analytical Framework for Trustable Machine Learning and Automation Running with Blockchain

Authors: Tao Wang | Published: 2019-03-21
Data Origins and Evolution
Data Preprocessing
Blockchain Technology

Contextual Bandits with Random Projection

Authors: Xiaotian Yu | Published: 2019-03-20
Online Decision Making
Reward Mechanism Design
High-Dimensional Data Processing

On the Robustness of Deep K-Nearest Neighbors

Authors: Chawin Sitawarin, David Wagner | Published: 2019-03-20
Certified Robustness
Effective Perturbation Methods
Adversarial Attack Detection

An Evaluation of Bitcoin Address Classification based on Transaction History Summarization

Authors: Yu-Jing Lin, Po-Wei Wu, Cheng-Han Hsu, I-Ping Tu, Shih-wei Liao | Published: 2019-03-19
Transaction Flow
Feature Selection Method
Statistical Analysis

Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

Authors: Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson | Published: 2019-03-18
Signal Processing Techniques
Adversarial Attack Methods
Speech Synthesis Technology