Certified Robustness

Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks

Authors: Qi Liu, Tao Liu, Zihao Liu, Yanzhi Wang, Yier Jin, Wujie Wen | Published: 2018-02-14 | Updated: 2018-03-19
Certified Robustness
Adversarial Example
Adversarial attack

Blind Pre-Processing: A Robust Defense Method Against Adversarial Examples

Authors: Adnan Siraj Rakin, Zhezhi He, Boqing Gong, Deliang Fan | Published: 2018-02-05 | Updated: 2018-02-07
Data Preprocessing
Certified Robustness
Adversarial Learning

Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach

Authors: Tsui-Wei Weng, Huan Zhang, Pin-Yu Chen, Jinfeng Yi, Dong Su, Yupeng Gao, Cho-Jui Hsieh, Luca Daniel | Published: 2018-01-31
Certified Robustness
Robustness Evaluation
Adversarial attack

A3T: Adversarially Augmented Adversarial Training

Authors: Akram Erraqabi, Aristide Baratin, Yoshua Bengio, Simon Lacoste-Julien | Published: 2018-01-12
Certified Robustness
Robustness Improvement Method
Adversarial Attack Detection

Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks

Authors: Yongshuai Liu, Jiyu Chen, Hao Chen | Published: 2018-01-09 | Updated: 2018-12-08
Certified Robustness
Adversarial Example
Adversarial Attack Detection

Adversarial Perturbation Intensity Achieving Chosen Intra-Technique Transferability Level for Logistic Regression

Authors: Martin Gubri | Published: 2018-01-06
Certified Robustness
Adversarial Attack Methods
Machine Learning Algorithm

The Robust Manifold Defense: Adversarial Training using Generative Models

Authors: Ajil Jalal, Andrew Ilyas, Constantinos Daskalakis, Alexandros G. Dimakis | Published: 2017-12-26 | Updated: 2019-07-10
Certified Robustness
Adversarial Example Detection
Adversarial Learning

Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models

Authors: Wieland Brendel, Jonas Rauber, Matthias Bethge | Published: 2017-12-12 | Updated: 2018-02-16
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

CycleGAN, a Master of Steganography

Authors: Casey Chu, Andrey Zhmoginov, Mark Sandler | Published: 2017-12-08 | Updated: 2017-12-16
Certified Robustness
Information Hiding Techniques
Generative Adversarial Network

Generative Adversarial Perturbations

Authors: Omid Poursaeed, Isay Katsman, Bicheng Gao, Serge Belongie | Published: 2017-12-06 | Updated: 2018-07-06
Certified Robustness
Adversarial Attack Methods
Generative Adversarial Network