Regularization Helps with Mitigating Poisoning Attacks: Distributionally-Robust Machine Learning Using the Wasserstein Distance Authors: Farhad Farokhi | Published: 2020-01-29 Robustness Improvement MethodContent Specialized for Toxicity AttacksContinuous Linear Function 2020.01.29 2025.05.28 Literature Database
Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis Authors: William Briguglio, Sherif Saad | Published: 2020-01-27 Robustness Improvement MethodMachine Learning TechnologyFeature Extraction Method 2020.01.27 2025.05.28 Literature Database
On Evaluating Adversarial Robustness Authors: Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian Goodfellow, Aleksander Madry, Alexey Kurakin | Published: 2019-02-18 | Updated: 2019-02-20 Certified RobustnessRobustness Improvement MethodAdversarial Attack Methods 2019.02.18 2025.05.28 Literature Database
Discretization based Solutions for Secure Machine Learning against Adversarial Attacks Authors: Priyadarshini Panda, Indranil Chakraborty, Kaushik Roy | Published: 2019-02-08 | Updated: 2019-02-11 Trigger DetectionCertified RobustnessRobustness Improvement Method 2019.02.08 2025.05.28 Literature Database
A Training-based Identification Approach to VIN Adversarial Examples Authors: Yingdi Wang, Wenjia Niu, Tong Chen, Yingxiao Xiang, Jingjing Liu, Gang Li, Jiqiang Liu | Published: 2018-10-18 Robustness Improvement MethodAdversarial Example DetectionAdversarial Attack Methods 2018.10.18 2025.05.28 Literature Database
ReDMark: Framework for Residual Diffusion Watermarking on Deep Networks Authors: Mahdi Ahmadi, Alireza Norouzi, S. M. Reza Soroushmehr, Nader Karimi, Kayvan Najarian, Shadrokh Samavi, Ali Emami | Published: 2018-10-16 | Updated: 2018-12-11 Robustness Improvement MethodPerformance Evaluation MetricsAdversarial Learning 2018.10.16 2025.05.28 Literature Database
Shallow-Deep Networks: Understanding and Mitigating Network Overthinking Authors: Yigitcan Kaya, Sanghyun Hong, Tudor Dumitras | Published: 2018-10-16 | Updated: 2019-05-09 Backdoor DetectionRobustness Improvement MethodImpact of Generalization 2018.10.16 2025.05.28 Literature Database
Adversarial Examples – A Complete Characterisation of the Phenomenon Authors: Alexandru Constantin Serban, Erik Poll, Joost Visser | Published: 2018-10-02 | Updated: 2019-02-17 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2018.10.02 2025.05.28 Literature Database
Improving the Generalization of Adversarial Training with Domain Adaptation Authors: Chuanbiao Song, Kun He, Liwei Wang, John E. Hopcroft | Published: 2018-10-01 | Updated: 2019-03-15 Robustness Improvement MethodAdversarial LearningAdversarial Attack Methods 2018.10.01 2025.05.28 Literature Database
Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network Authors: Xuanqing Liu, Yao Li, Chongruo Wu, Cho-Jui Hsieh | Published: 2018-10-01 | Updated: 2019-05-04 Certified RobustnessRobustness Improvement MethodAdversarial Learning 2018.10.01 2025.05.28 Literature Database