Mitigation of Policy Manipulation Attacks on Deep Q-Networks with Parameter-Space Noise Authors: Vahid Behzadan, Arslan Munir | Published: 2018-06-04 Certified RobustnessReinforcement LearningAdversarial Example 2018.06.04 2025.05.28 Literature Database
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models Authors: Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, Michael Backes | Published: 2018-06-04 | Updated: 2018-12-14 Membership InferenceModel Extraction AttackWatermark Evaluation 2018.06.04 2025.05.28 Literature Database
Sufficient Conditions for Idealised Models to Have No Adversarial Examples: a Theoretical and Empirical Study with Bayesian Neural Networks Authors: Yarin Gal, Lewis Smith | Published: 2018-06-02 | Updated: 2018-06-28 Label UncertaintyAdversarial ExampleAdversarial Transferability 2018.06.02 2025.05.28 Literature Database
Detecting Adversarial Examples via Key-based Network Authors: Pinlong Zhao, Zhouyu Fu, Ou wu, Qinghua Hu, Jun Wang | Published: 2018-06-02 Adversarial LearningAdversarial TransferabilityWatermark Evaluation 2018.06.02 2025.05.28 Literature Database
Tokenized Data Markets Authors: Bharath Ramsundar, Roger Chen, Alok Vasudev, Rob Robbins, Artur Gorokh | Published: 2018-05-31 Data Flow AnalysisVoting MechanismWatermark Evaluation 2018.05.31 2025.05.28 Literature Database
PeerNets: Exploiting Peer Wisdom Against Adversarial Attacks Authors: Jan Svoboda, Jonathan Masci, Federico Monti, Michael M. Bronstein, Leonidas Guibas | Published: 2018-05-31 Trigger DetectionAdversarial Example DetectionDeep Learning Method 2018.05.31 2025.05.28 Literature Database
Resisting Adversarial Attacks using Gaussian Mixture Variational Autoencoders Authors: Partha Ghosh, Arpan Losalka, Michael J Black | Published: 2018-05-31 | Updated: 2018-12-10 Certified RobustnessLoss FunctionAdversarial Example 2018.05.31 2025.05.28 Literature Database
Defending Against Machine Learning Model Stealing Attacks Using Deceptive Perturbations Authors: Taesung Lee, Benjamin Edwards, Ian Molloy, Dong Su | Published: 2018-05-31 | Updated: 2018-12-13 Certified RobustnessDetection of Model Extraction AttacksWatermark Evaluation 2018.05.31 2025.05.28 Literature Database
Sequential Attacks on Agents for Long-Term Adversarial Goals Authors: Edgar Tretschk, Seong Joon Oh, Mario Fritz | Published: 2018-05-31 | Updated: 2018-07-05 Certified RobustnessReinforcement LearningAdversarial Transferability 2018.05.31 2025.05.28 Literature Database
Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data Authors: Puyudi Yang, Jianbo Chen, Cho-Jui Hsieh, Jane-Ling Wang, Michael I. Jordan | Published: 2018-05-31 Adversarial TransferabilityFeature Importance AnalysisWatermark Evaluation 2018.05.31 2025.05.28 Literature Database