Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models Authors: Wieland Brendel, Jonas Rauber, Matthias Bethge | Published: 2017-12-12 | Updated: 2018-02-16 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2017.12.12 2025.05.28 Literature Database
CycleGAN, a Master of Steganography Authors: Casey Chu, Andrey Zhmoginov, Mark Sandler | Published: 2017-12-08 | Updated: 2017-12-16 Certified RobustnessInformation Hiding TechniquesGenerative Adversarial Network 2017.12.08 2025.05.28 Literature Database
Generative Adversarial Perturbations Authors: Omid Poursaeed, Isay Katsman, Bicheng Gao, Serge Belongie | Published: 2017-12-06 | Updated: 2018-07-06 Certified RobustnessAdversarial Attack MethodsGenerative Adversarial Network 2017.12.06 2025.05.28 Literature Database
Where Classification Fails, Interpretation Rises Authors: Chanh Nguyen, Georgi Georgiev, Yujie Ji, Ting Wang | Published: 2017-12-02 FDI Attack Detection MethodsCertified RobustnessAdversarial Learning 2017.12.02 2025.05.28 Literature Database
Evaluating Robustness of Neural Networks with Mixed Integer Programming Authors: Vincent Tjeng, Kai Xiao, Russ Tedrake | Published: 2017-11-20 | Updated: 2019-02-18 Certified RobustnessRobustnessDeep Learning Technology 2017.11.20 2025.05.28 Literature Database
The best defense is a good offense: Countering black box attacks by predicting slightly wrong labels Authors: Yannic Kilcher, Thomas Hofmann | Published: 2017-11-15 Backdoor DetectionProactive DefenseCertified Robustness 2017.11.15 2025.05.28 Literature Database
LatentPoison – Adversarial Attacks On The Latent Space Authors: Antonia Creswell, Anil A. Bharath, Biswa Sengupta | Published: 2017-11-08 PoisoningCertified RobustnessAdversarial attack 2017.11.08 2025.05.28 Literature Database
Provable defenses against adversarial examples via the convex outer adversarial polytope Authors: Eric Wong, J. Zico Kolter | Published: 2017-11-02 | Updated: 2018-06-08 Certified RobustnessRobustnessDeep Learning Technology 2017.11.02 2025.05.28 Literature Database
Attacking Binarized Neural Networks Authors: Angus Galloway, Graham W. Taylor, Medhat Moussa | Published: 2017-11-01 | Updated: 2018-01-31 Certified RobustnessRobustness Improvement MethodAdversarial Example 2017.11.01 2025.05.28 Literature Database
Attacking the Madry Defense Model with $L_1$-based Adversarial Examples Authors: Yash Sharma, Pin-Yu Chen | Published: 2017-10-30 | Updated: 2018-07-27 Certified RobustnessRobustness Improvement MethodAdversarial Example Detection 2017.10.30 2025.05.28 Literature Database