Adversarial Examples on Graph Data: Deep Insights into Attack and Defense Authors: Huijun Wu, Chen Wang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, Liming Zhu | Published: 2019-03-05 | Updated: 2019-05-22 Certified RobustnessAdversarial ExampleAdversarial Perturbation Techniques 2019.03.05 2025.05.28 Literature Database
Enhancing the Robustness of Deep Neural Networks by Boundary Conditional GAN Authors: Ke Sun, Zhanxing Zhu, Zhouchen Lin | Published: 2019-02-28 Certified RobustnessRobustness Improvement MethodAdversarial Learning 2019.02.28 2025.05.28 Literature Database
Tensor Dropout for Robust Learning Authors: Arinbjörn Kolbeinsson, Jean Kossaifi, Yannis Panagakis, Adrian Bulat, Anima Anandkumar, Ioanna Tzoulaki, Paul Matthews | Published: 2019-02-27 | Updated: 2020-12-11 Certified RobustnessMedical Image AnalysisRobustness Improvement Method 2019.02.27 2025.05.28 Literature Database
A Convex Relaxation Barrier to Tight Robustness Verification of Neural Networks Authors: Hadi Salman, Greg Yang, Huan Zhang, Cho-Jui Hsieh, Pengchuan Zhang | Published: 2019-02-23 | Updated: 2020-01-10 Certified RobustnessRobustness EvaluationAdversarial Learning 2019.02.23 2025.05.28 Literature Database
Quantifying Perceptual Distortion of Adversarial Examples Authors: Matt Jordan, Naren Manoj, Surbhi Goel, Alexandros G. Dimakis | Published: 2019-02-21 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2019.02.21 2025.05.28 Literature Database
Wasserstein Adversarial Examples via Projected Sinkhorn Iterations Authors: Eric Wong, Frank R. Schmidt, J. Zico Kolter | Published: 2019-02-21 | Updated: 2020-01-18 Wasserstein DistanceCertified RobustnessAdversarial Attack Methods 2019.02.21 2025.05.28 Literature Database
There are No Bit Parts for Sign Bits in Black-Box Attacks Authors: Abdullah Al-Dujaili, Una-May O'Reilly | Published: 2019-02-19 | Updated: 2019-04-03 Certified RobustnessAdversarial Attack MethodsOptimization Strategy 2019.02.19 2025.05.28 Literature Database
On Evaluating Adversarial Robustness Authors: Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian Goodfellow, Aleksander Madry, Alexey Kurakin | Published: 2019-02-18 | Updated: 2019-02-20 Certified RobustnessRobustness Improvement MethodAdversarial Attack Methods 2019.02.18 2025.05.28 Literature Database
The Odds are Odd: A Statistical Test for Detecting Adversarial Examples Authors: Kevin Roth, Yannic Kilcher, Thomas Hofmann | Published: 2019-02-13 | Updated: 2019-05-09 Certified RobustnessAdversarial attackAdversarial Attack Methods 2019.02.13 2025.05.28 Literature Database
Discretization based Solutions for Secure Machine Learning against Adversarial Attacks Authors: Priyadarshini Panda, Indranil Chakraborty, Kaushik Roy | Published: 2019-02-08 | Updated: 2019-02-11 Trigger DetectionCertified RobustnessRobustness Improvement Method 2019.02.08 2025.05.28 Literature Database