A Convex Relaxation Barrier to Tight Robustness Verification of Neural Networks Authors: Hadi Salman, Greg Yang, Huan Zhang, Cho-Jui Hsieh, Pengchuan Zhang | Published: 2019-02-23 | Updated: 2020-01-10 Certified RobustnessRobustness EvaluationAdversarial Learning 2019.02.23 2025.05.28 Literature Database
Quantifying Perceptual Distortion of Adversarial Examples Authors: Matt Jordan, Naren Manoj, Surbhi Goel, Alexandros G. Dimakis | Published: 2019-02-21 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2019.02.21 2025.05.28 Literature Database
Wasserstein Adversarial Examples via Projected Sinkhorn Iterations Authors: Eric Wong, Frank R. Schmidt, J. Zico Kolter | Published: 2019-02-21 | Updated: 2020-01-18 Wasserstein DistanceCertified RobustnessAdversarial Attack Methods 2019.02.21 2025.05.28 Literature Database
There are No Bit Parts for Sign Bits in Black-Box Attacks Authors: Abdullah Al-Dujaili, Una-May O'Reilly | Published: 2019-02-19 | Updated: 2019-04-03 Certified RobustnessAdversarial Attack MethodsOptimization Strategy 2019.02.19 2025.05.28 Literature Database
On Evaluating Adversarial Robustness Authors: Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian Goodfellow, Aleksander Madry, Alexey Kurakin | Published: 2019-02-18 | Updated: 2019-02-20 Certified RobustnessRobustness Improvement MethodAdversarial Attack Methods 2019.02.18 2025.05.28 Literature Database
The Odds are Odd: A Statistical Test for Detecting Adversarial Examples Authors: Kevin Roth, Yannic Kilcher, Thomas Hofmann | Published: 2019-02-13 | Updated: 2019-05-09 Certified RobustnessAdversarial attackAdversarial Attack Methods 2019.02.13 2025.05.28 Literature Database
Discretization based Solutions for Secure Machine Learning against Adversarial Attacks Authors: Priyadarshini Panda, Indranil Chakraborty, Kaushik Roy | Published: 2019-02-08 | Updated: 2019-02-11 Trigger DetectionCertified RobustnessRobustness Improvement Method 2019.02.08 2025.05.28 Literature Database
Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis Authors: Danilo Vasconcellos Vargas, Jiawei Su | Published: 2019-02-08 Certified RobustnessAdversarial Attack MethodsImage Classification Interpretation 2019.02.08 2025.05.28 Literature Database
The Efficacy of SHIELD under Different Threat Models Authors: Cory Cornelius, Nilaksh Das, Shang-Tse Chen, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2019-02-01 | Updated: 2019-08-02 Certified RobustnessAdversarial attackThreat modeling 2019.02.01 2025.05.28 Literature Database
Natural and Adversarial Error Detection using Invariance to Image Transformations Authors: Yuval Bahat, Michal Irani, Gregory Shakhnarovich | Published: 2019-02-01 Data CurationCertified RobustnessRobustness Improvement 2019.02.01 2025.05.28 Literature Database