Boosting Adversarial Attacks with Momentum Authors: Yinpeng Dong, Fangzhou Liao, Tianyu Pang, Hang Su, Jun Zhu, Xiaolin Hu, Jianguo Li | Published: 2017-10-17 | Updated: 2018-03-22 Certified RobustnessRobustness Improvement MethodAdversarial Example Detection 2017.10.17 2025.05.28 Literature Database
Bayesian Hypernetworks Authors: David Krueger, Chin-Wei Huang, Riashat Islam, Ryan Turner, Alexandre Lacoste, Aaron Courville | Published: 2017-10-13 | Updated: 2018-04-24 Certified RobustnessModel DesignLabel 2017.10.13 2025.05.28 Literature Database
Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification Authors: Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2017-09-17 | Updated: 2019-12-31 Certified RobustnessAdversarial LearningAdversarial Example Detection 2017.09.17 2025.05.28 Literature Database
EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples Authors: Pin-Yu Chen, Yash Sharma, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh | Published: 2017-09-13 | Updated: 2018-02-10 Certified RobustnessAdversarial LearningAdversarial Example 2017.09.13 2025.05.28 Literature Database
Ensemble Methods as a Defense to Adversarial Perturbations Against Deep Neural Networks Authors: Thilo Strauss, Markus Hanselmann, Andrej Junginger, Holger Ulmer | Published: 2017-09-11 | Updated: 2018-02-08 Certified RobustnessModel Performance EvaluationRobustness Improvement 2017.09.11 2025.05.28 Literature Database
Towards Proving the Adversarial Robustness of Deep Neural Networks Authors: Guy Katz, Clark Barrett, David L. Dill, Kyle Julian, Mykel J. Kochenderfer | Published: 2017-09-08 Certified RobustnessRobustness ImprovementAdversarial Learning 2017.09.08 2025.05.28 Literature Database
Learning Universal Adversarial Perturbations with Generative Models Authors: Jamie Hayes, George Danezis | Published: 2017-08-17 | Updated: 2018-01-05 Certified RobustnessAttack MethodAdversarial Example 2017.08.17 2025.05.28 Literature Database
ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models Authors: Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, Cho-Jui Hsieh | Published: 2017-08-14 | Updated: 2017-11-02 PoisoningCertified RobustnessAttack Method 2017.08.14 2025.05.28 Literature Database
Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers Authors: Ishai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici | Published: 2017-07-19 | Updated: 2018-06-24 Backdoor AttackDataset for Malware ClassificationCertified Robustness 2017.07.19 2025.05.28 Literature Database
Houdini: Fooling Deep Structured Prediction Models Authors: Moustapha Cisse, Yossi Adi, Natalia Neverova, Joseph Keshet | Published: 2017-07-17 Certified RobustnessAdversarial Attack AssessmentSpeech Recognition Technology 2017.07.17 2025.05.28 Literature Database