Robustness Improvement Method

Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks

Authors: Ka-Ho Chow, Wenqi Wei, Yanzhao Wu, Ling Liu | Published: 2019-08-21 | Updated: 2019-10-26
Robustness Improvement Method
Adversarial Example
Adversarial Attack Methods

Transferring Robustness for Graph Neural Network Against Poisoning Attacks

Authors: Xianfeng Tang, Yandong Li, Yiwei Sun, Huaxiu Yao, Prasenjit Mitra, Suhang Wang | Published: 2019-08-20 | Updated: 2020-02-26
Poisoning
Robustness Improvement Method
Content Specialized for Toxicity Attacks

Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses

Authors: Xiao Wang, Siyue Wang, Pin-Yu Chen, Yanzhi Wang, Brian Kulis, Xue Lin, Peter Chin | Published: 2019-08-20
Poisoning
Robustness Improvement Method
Adversarial Attack Methods

Verification of Neural Network Control Policy Under Persistent Adversarial Perturbation

Authors: Yuh-Shyang Wang, Tsui-Wei Weng, Luca Daniel | Published: 2019-08-18
Robustness Improvement Method
Adversarial Example
Deep Reinforcement Learning

Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks

Authors: Jiadong Lin, Chuanbiao Song, Kun He, Liwei Wang, John E. Hopcroft | Published: 2019-08-17 | Updated: 2020-02-03
Robustness Improvement Method
Attack Evaluation
Adversarial Attack Methods

Adversarial shape perturbations on 3D point clouds

Authors: Daniel Liu, Ronald Yu, Hao Su | Published: 2019-08-16 | Updated: 2020-10-23
Robustness Improvement Method
Attack Evaluation
Adversarial Attack Methods

On the Adversarial Robustness of Neural Networks without Weight Transport

Authors: Mohamed Akrout | Published: 2019-08-09 | Updated: 2019-10-03
Robustness Improvement Method
Adversarial Example
Adversarial Attack Methods

Defending Against Adversarial Iris Examples Using Wavelet Decomposition

Authors: Sobhan Soleymani, Ali Dabouei, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2019-08-08
Robustness Improvement Method
Adversarial Example
Adversarial Attack Methods

Investigating Decision Boundaries of Trained Neural Networks

Authors: Roozbeh Yousefzadeh, Dianne P O'Leary | Published: 2019-08-07
Robustness Improvement Method
Adversarial Example
Adversarial Attack Methods

BlurNet: Defense by Filtering the Feature Maps

Authors: Ravi Raju, Mikko Lipasti | Published: 2019-08-06 | Updated: 2020-05-16
Robustness Improvement Method
Attack Evaluation
Adversarial Attack Methods