Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks Authors: Qi Liu, Tao Liu, Zihao Liu, Yanzhi Wang, Yier Jin, Wujie Wen | Published: 2018-02-14 | Updated: 2018-03-19 Certified RobustnessAdversarial ExampleAdversarial attack 2018.02.14 2025.05.28 Literature Database
Blind Pre-Processing: A Robust Defense Method Against Adversarial Examples Authors: Adnan Siraj Rakin, Zhezhi He, Boqing Gong, Deliang Fan | Published: 2018-02-05 | Updated: 2018-02-07 Data PreprocessingCertified RobustnessAdversarial Learning 2018.02.05 2025.05.28 Literature Database
Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach Authors: Tsui-Wei Weng, Huan Zhang, Pin-Yu Chen, Jinfeng Yi, Dong Su, Yupeng Gao, Cho-Jui Hsieh, Luca Daniel | Published: 2018-01-31 Certified RobustnessRobustness EvaluationAdversarial attack 2018.01.31 2025.05.28 Literature Database
A3T: Adversarially Augmented Adversarial Training Authors: Akram Erraqabi, Aristide Baratin, Yoshua Bengio, Simon Lacoste-Julien | Published: 2018-01-12 Certified RobustnessRobustness Improvement MethodAdversarial Attack Detection 2018.01.12 2025.05.28 Literature Database
Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks Authors: Yongshuai Liu, Jiyu Chen, Hao Chen | Published: 2018-01-09 | Updated: 2018-12-08 Certified RobustnessAdversarial ExampleAdversarial Attack Detection 2018.01.09 2025.05.28 Literature Database
Adversarial Perturbation Intensity Achieving Chosen Intra-Technique Transferability Level for Logistic Regression Authors: Martin Gubri | Published: 2018-01-06 Certified RobustnessAdversarial Attack MethodsMachine Learning Algorithm 2018.01.06 2025.05.28 Literature Database
The Robust Manifold Defense: Adversarial Training using Generative Models Authors: Ajil Jalal, Andrew Ilyas, Constantinos Daskalakis, Alexandros G. Dimakis | Published: 2017-12-26 | Updated: 2019-07-10 Certified RobustnessAdversarial Example DetectionAdversarial Learning 2017.12.26 2025.05.28 Literature Database
Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models Authors: Wieland Brendel, Jonas Rauber, Matthias Bethge | Published: 2017-12-12 | Updated: 2018-02-16 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2017.12.12 2025.05.28 Literature Database
CycleGAN, a Master of Steganography Authors: Casey Chu, Andrey Zhmoginov, Mark Sandler | Published: 2017-12-08 | Updated: 2017-12-16 Certified RobustnessInformation Hiding TechniquesGenerative Adversarial Network 2017.12.08 2025.05.28 Literature Database
Generative Adversarial Perturbations Authors: Omid Poursaeed, Isay Katsman, Bicheng Gao, Serge Belongie | Published: 2017-12-06 | Updated: 2018-07-06 Certified RobustnessAdversarial Attack MethodsGenerative Adversarial Network 2017.12.06 2025.05.28 Literature Database