Certified Robustness

A Convex Relaxation Barrier to Tight Robustness Verification of Neural Networks

Authors: Hadi Salman, Greg Yang, Huan Zhang, Cho-Jui Hsieh, Pengchuan Zhang | Published: 2019-02-23 | Updated: 2020-01-10
Certified Robustness
Robustness Evaluation
Adversarial Learning

Quantifying Perceptual Distortion of Adversarial Examples

Authors: Matt Jordan, Naren Manoj, Surbhi Goel, Alexandros G. Dimakis | Published: 2019-02-21
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

Wasserstein Adversarial Examples via Projected Sinkhorn Iterations

Authors: Eric Wong, Frank R. Schmidt, J. Zico Kolter | Published: 2019-02-21 | Updated: 2020-01-18
Wasserstein Distance
Certified Robustness
Adversarial Attack Methods

There are No Bit Parts for Sign Bits in Black-Box Attacks

Authors: Abdullah Al-Dujaili, Una-May O'Reilly | Published: 2019-02-19 | Updated: 2019-04-03
Certified Robustness
Adversarial Attack Methods
Optimization Strategy

On Evaluating Adversarial Robustness

Authors: Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian Goodfellow, Aleksander Madry, Alexey Kurakin | Published: 2019-02-18 | Updated: 2019-02-20
Certified Robustness
Robustness Improvement Method
Adversarial Attack Methods

The Odds are Odd: A Statistical Test for Detecting Adversarial Examples

Authors: Kevin Roth, Yannic Kilcher, Thomas Hofmann | Published: 2019-02-13 | Updated: 2019-05-09
Certified Robustness
Adversarial attack
Adversarial Attack Methods

Discretization based Solutions for Secure Machine Learning against Adversarial Attacks

Authors: Priyadarshini Panda, Indranil Chakraborty, Kaushik Roy | Published: 2019-02-08 | Updated: 2019-02-11
Trigger Detection
Certified Robustness
Robustness Improvement Method

Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis

Authors: Danilo Vasconcellos Vargas, Jiawei Su | Published: 2019-02-08
Certified Robustness
Adversarial Attack Methods
Image Classification Interpretation

The Efficacy of SHIELD under Different Threat Models

Authors: Cory Cornelius, Nilaksh Das, Shang-Tse Chen, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2019-02-01 | Updated: 2019-08-02
Certified Robustness
Adversarial attack
Threat modeling

Natural and Adversarial Error Detection using Invariance to Image Transformations

Authors: Yuval Bahat, Michal Irani, Gregory Shakhnarovich | Published: 2019-02-01
Data Curation
Certified Robustness
Robustness Improvement