Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets Authors: Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey, Xingjun Ma | Published: 2020-02-14 PoisoningAdversarial Attack DetectionDefense Method 2020.02.14 2025.05.28 Literature Database
CEB Improves Model Robustness Authors: Ian Fischer, Alexander A. Alemi | Published: 2020-02-13 PoisoningModel Selection MethodRobustness Evaluation 2020.02.13 2025.05.28 Literature Database
Adversarial Robustness for Code Authors: Pavol Bielik, Martin Vechev | Published: 2020-02-11 | Updated: 2020-08-15 PoisoningRobustness Improvement MethodAdversarial Training 2020.02.11 2025.05.28 Literature Database
Adversarial Data Encryption Authors: Yingdong Hu, Liang Zhang, Wei Shan, Xiaoxiao Qin, Jing Qi, Zhenzhou Wu, Yang Yuan | Published: 2020-02-10 | Updated: 2020-02-11 PoisoningAdversarial attackCryptography 2020.02.10 2025.05.28 Literature Database
Certified Robustness to Label-Flipping Attacks via Randomized Smoothing Authors: Elan Rosenfeld, Ezra Winston, Pradeep Ravikumar, J. Zico Kolter | Published: 2020-02-07 | Updated: 2020-08-11 PoisoningRobustness Improvement MethodContinuous Linear Function 2020.02.07 2025.05.28 Literature Database
Assessing the Adversarial Robustness of Monte Carlo and Distillation Methods for Deep Bayesian Neural Network Classification Authors: Meet P. Vadera, Satya Narayan Shukla, Brian Jalaian, Benjamin M. Marlin | Published: 2020-02-07 Bayesian ClassificationPoisoningAdversarial Example 2020.02.07 2025.05.28 Literature Database
Can’t Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks Authors: Moshe Kravchik, Asaf Shabtai | Published: 2020-02-07 PoisoningRobustness Improvement MethodContent Specialized for Toxicity Attacks 2020.02.07 2025.05.28 Literature Database
Learning to Detect Malicious Clients for Robust Federated Learning Authors: Suyi Li, Yong Cheng, Wei Wang, Yang Liu, Tianjian Chen | Published: 2020-02-01 PoisoningMalicious Node DetectionFederated Learning System 2020.02.01 2025.05.28 Literature Database
Adversarial Attack on Community Detection by Hiding Individuals Authors: Jia Li, Honglei Zhang, Zhichao Han, Yu Rong, Hong Cheng, Junzhou Huang | Published: 2020-01-22 Community DetectionPoisoningAdversarial Attack Detection 2020.01.22 2025.05.28 Literature Database
Advbox: a toolbox to generate adversarial examples that fool neural networks Authors: Dou Goodman, Hao Xin, Wang Yang, Wu Yuesheng, Xiong Junfeng, Zhang Huan | Published: 2020-01-13 | Updated: 2020-08-26 PoisoningAdversarial ExampleAdversarial Attack Methods 2020.01.13 2025.05.28 Literature Database