Reconstruction of Privacy-Sensitive Data from Protected Templates Authors: Shideh Rezaeifar, Behrooz Razeghi, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-05-08 Privacy TechniqueReconstruction AttackFactors of Performance Degradation 2019.05.08 2025.05.28 Literature Database
Adversarial Examples Are Not Bugs, They Are Features Authors: Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Logan Engstrom, Brandon Tran, Aleksander Madry | Published: 2019-05-06 | Updated: 2019-08-12 Robust EstimationFactors of Performance DegradationAdversarial Example 2019.05.06 2025.05.28 Literature Database