Bridging the Gap Between Adversarial Robustness and Optimization Bias Authors: Fartash Faghri, Sven Gowal, Cristina Vasconcelos, David J. Fleet, Fabian Pedregosa, Nicolas Le Roux | Published: 2021-02-17 | Updated: 2021-06-07 Model ArchitectureAdversarial ExampleAdversarial Training 2021.02.17 2025.05.28 Literature Database
Certifiably Robust Variational Autoencoders Authors: Ben Barrett, Alexander Camuto, Matthew Willetts, Tom Rainforth | Published: 2021-02-15 | Updated: 2022-04-23 WatermarkingData GenerationModel Architecture 2021.02.15 2025.05.28 Literature Database
Efficient Certified Defenses Against Patch Attacks on Image Classifiers Authors: Jan Hendrik Metzen, Maksym Yatsura | Published: 2021-02-08 WatermarkingModel ArchitectureAdversarial Training 2021.02.08 2025.05.28 Literature Database
CATBERT: Context-Aware Tiny BERT for Detecting Social Engineering Emails Authors: Younghoo Lee, Joshua Saxe, Richard Harang | Published: 2020-10-07 Model ArchitectureImprovement of LearningMachine Learning 2020.10.07 2025.05.28 Literature Database
Deep learning for time series classification Authors: Hassan Ismail Fawaz | Published: 2020-10-01 Model ArchitectureAdversarial ExampleDeep Learning Method 2020.10.01 2025.05.28 Literature Database
Bag of Tricks for Adversarial Training Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu | Published: 2020-10-01 | Updated: 2021-03-31 Model ArchitectureRobustness Improvement MethodOptimization Methods 2020.10.01 2025.05.28 Literature Database
Secure Evaluation of Quantized Neural Networks Authors: Anders Dalskov, Daniel Escudero, Marcel Keller | Published: 2019-10-28 | Updated: 2021-03-01 Protocol ProcedureModel ArchitectureEvaluation Method 2019.10.28 2025.05.28 Literature Database
Neurlux: Dynamic Malware Analysis Without Feature Engineering Authors: Chani Jindal, Christopher Salls, Hojjat Aghakhani, Keith Long, Christopher Kruegel, Giovanni Vigna | Published: 2019-10-24 Model ArchitectureDynamic Analysis MethodPerformance Evaluation Metrics 2019.10.24 2025.05.28 Literature Database
Edge Dithering for Robust Adaptive Graph Convolutional Networks Authors: Vassilis N. Ioannidis, Georgios B. Giannakis | Published: 2019-10-21 Graph Neural NetworkPoisoningModel Architecture 2019.10.21 2025.05.28 Literature Database
Deep Learning in Information Security Authors: Stefan Thaler, Vlado Menkovski, Milan Petkovic | Published: 2018-09-12 Model ArchitectureCertified RobustnessFeature Extraction Method 2018.09.12 2025.05.28 Literature Database