Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems Authors: Yue Gao, Ilia Shumailov, Kassem Fawaz | Published: 2021-04-18 | Updated: 2022-06-19 Adversarial ExampleAdversarial Example DetectionDefense Mechanism 2021.04.18 2025.05.28 Literature Database
Sparse Coding Frontend for Robust Neural Networks Authors: Can Bakiskan, Metehan Cekic, Ahmet Dundar Sezer, Upamanyu Madhow | Published: 2021-04-12 PoisoningAdversarial Example DetectionDefense Mechanism 2021.04.12 2025.05.28 Literature Database
Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain Authors: Jinyu Tian, Jiantao Zhou, Yuanman Li, Jia Duan | Published: 2021-03-07 Attack Scenario AnalysisAdversarial Example DetectionAdversarial Learning 2021.03.07 2025.05.28 Literature Database
Identifying Untrustworthy Predictions in Neural Networks by Geometric Gradient Analysis Authors: Leo Schwinn, An Nguyen, René Raab, Leon Bungert, Daniel Tenbrinck, Dario Zanca, Martin Burger, Bjoern Eskofier | Published: 2021-02-24 Model Performance EvaluationTrust Evaluation ModuleAdversarial Example Detection 2021.02.24 2025.05.28 Literature Database
Adversarial Robustness with Non-uniform Perturbations Authors: Ecenaz Erdemir, Jeffrey Bickford, Luca Melis, Sergul Aydore | Published: 2021-02-24 | Updated: 2021-10-29 Malware Detection MethodAdversarial ExampleAdversarial Example Detection 2021.02.24 2025.05.28 Literature Database
Adversarially Robust Learning with Unknown Perturbation Sets Authors: Omar Montasser, Steve Hanneke, Nathan Srebro | Published: 2021-02-03 Model Performance EvaluationAdversarial Example DetectionAdversarial Training 2021.02.03 2025.05.28 Literature Database
ATRO: Adversarial Training with a Rejection Option Authors: Masahiro Kato, Zhenghang Cui, Yoshihiro Fukuhara | Published: 2020-10-24 Adversarial ExampleAdversarial Example DetectionMachine Learning Algorithm 2020.10.24 2025.05.28 Literature Database
ATOM: Robustifying Out-of-distribution Detection Using Outlier Mining Authors: Jiefeng Chen, Yixuan Li, Xi Wu, Yingyu Liang, Somesh Jha | Published: 2020-06-26 | Updated: 2021-06-30 Out-of-Distribution DetectionAdversarial Example DetectionAdversarial attack 2020.06.26 2025.05.28 Literature Database
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods? Authors: Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu | Published: 2020-06-26 | Updated: 2022-07-28 Backdoor AttackAdversarial Example DetectionAdversarial attack 2020.06.26 2025.05.28 Literature Database
Adversarial Feature Desensitization Authors: Pouya Bashivan, Reza Bayat, Adam Ibrahim, Kartik Ahuja, Mojtaba Faramarzi, Touraj Laleh, Blake Aaron Richards, Irina Rish | Published: 2020-06-08 | Updated: 2022-01-04 AlgorithmAdversarial ExampleAdversarial Example Detection 2020.06.08 2025.05.28 Literature Database