The Curse of Concentration in Robust Learning: Evasion and Poisoning Attacks from Concentration of Measure Authors: Saeed Mahloujifar, Dimitrios I. Diochnos, Mohammad Mahmoody | Published: 2018-09-09 | Updated: 2018-11-06 Certified RobustnessRobustness AnalysisAdversarial Transferability 2018.09.09 2025.05.28 Literature Database
Are adversarial examples inevitable? Authors: Ali Shafahi, W. Ronny Huang, Christoph Studer, Soheil Feizi, Tom Goldstein | Published: 2018-09-06 | Updated: 2020-02-03 Robustness AnalysisAdversarial ExampleAdversarial Example Detection 2018.09.06 2025.05.28 Literature Database
Bridging machine learning and cryptography in defence against adversarial attacks Authors: Olga Taran, Shideh Rezaeifar, Slava Voloshynovskiy | Published: 2018-09-05 Certified RobustnessDetection of Model Extraction AttacksRobustness Analysis 2018.09.05 2025.05.28 Literature Database
Adversarial Attacks on Node Embeddings via Graph Poisoning Authors: Aleksandar Bojchevski, Stephan Günnemann | Published: 2018-09-04 | Updated: 2019-05-27 PoisoningCertified RobustnessRobustness Analysis 2018.09.04 2025.05.28 Literature Database
Adversarial Attack Type I: Cheat Classifiers by Significant Changes Authors: Sanli Tang, Xiaolin Huang, Mingjian Chen, Chengjin Sun, Jie Yang | Published: 2018-09-03 | Updated: 2019-07-22 Trigger DetectionRobustness AnalysisAdversarial Transferability 2018.09.03 2025.05.28 Literature Database
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation Authors: Cong Liao, Haoti Zhong, Anna Squicciarini, Sencun Zhu, David Miller | Published: 2018-08-30 Backdoor AttackBackdoor Attack MitigationRobustness Analysis 2018.08.30 2025.05.28 Literature Database
Lipschitz regularized Deep Neural Networks generalize and are adversarially robust Authors: Chris Finlay, Jeff Calder, Bilal Abbasi, Adam Oberman | Published: 2018-08-28 | Updated: 2019-09-12 Certified RobustnessRobustness AnalysisAdversarial Learning 2018.08.28 2025.05.28 Literature Database
Stochastic Combinatorial Ensembles for Defending Against Adversarial Examples Authors: George A. Adam, Petr Smirnov, David Duvenaud, Benjamin Haibe-Kains, Anna Goldenberg | Published: 2018-08-20 | Updated: 2018-09-08 Robustness AnalysisAdversarial attackProbability distribution 2018.08.20 2025.05.28 Literature Database
Mitigation of Adversarial Attacks through Embedded Feature Selection Authors: Ziyi Bao, Luis Muñoz-González, Emil C. Lupu | Published: 2018-08-16 Certified RobustnessRobustness AnalysisAdversarial attack 2018.08.16 2025.05.28 Literature Database
Mitigating Sybils in Federated Learning Poisoning Authors: Clement Fung, Chris J. M. Yoon, Ivan Beschastnikh | Published: 2018-08-14 | Updated: 2020-07-15 PoisoningRobustness AnalysisAdversarial attack 2018.08.14 2025.05.28 Literature Database