Integrating uncertainty quantification into randomized smoothing based robustness guarantees Authors: Sina Däubener, Kira Maag, David Krueger, Asja Fischer | Published: 2024-10-27 Adversarial ExampleEquivalence Evaluation 2024.10.27 2025.05.27 Literature Database
Feature Averaging: An Implicit Bias of Gradient Descent Leading to Non-Robustness in Neural Networks Authors: Binghui Li, Zhixuan Pan, Kaifeng Lyu, Jian Li | Published: 2024-10-14 Convergence AnalysisAdversarial Example 2024.10.14 2025.05.27 Literature Database
Minimax rates of convergence for nonparametric regression under adversarial attacks Authors: Jingfu Peng, Yuhong Yang | Published: 2024-10-12 | Updated: 2025-05-13 Adversarial ExampleAdversarial Training 2024.10.12 2025.05.27 Literature Database
Time Traveling to Defend Against Adversarial Example Attacks in Image Classification Authors: Anthony Etim, Jakub Szefer | Published: 2024-10-10 Attack MethodAdversarial ExampleDefense Method 2024.10.10 2025.05.27 Literature Database
LOTOS: Layer-wise Orthogonalization for Training Robust Ensembles Authors: Ali Ebrahimpour-Boroojeny, Hari Sundaram, Varun Chandrasekaran | Published: 2024-10-07 Adversarial ExampleAdversarial Training 2024.10.07 2025.05.27 Literature Database
Impact of White-Box Adversarial Attacks on Convolutional Neural Networks Authors: Rakesh Podder, Sudipto Ghosh | Published: 2024-10-02 Model Performance EvaluationAttack MethodAdversarial Example 2024.10.02 2025.05.27 Literature Database
On Using Certified Training towards Empirical Robustness Authors: Alessandro De Palma, Serge Durand, Zakaria Chihani, François Terrier, Caterina Urban | Published: 2024-10-02 | Updated: 2025-03-24 Adversarial ExampleRegularization 2024.10.02 2025.05.27 Literature Database
Boosting Certified Robustness for Time Series Classification with Efficient Self-Ensemble Authors: Chang Dong, Zhengyang Li, Liangwei Zheng, Weitong Chen, Wei Emma Zhang | Published: 2024-09-04 | Updated: 2024-09-19 Adversarial ExampleEvaluation MethodWatermark Evaluation 2024.09.04 2025.05.27 Literature Database
Adversarial Attacks on Machine Learning-Aided Visualizations Authors: Takanori Fujiwara, Kostiantyn Kucher, Junpeng Wang, Rafael M. Martins, Andreas Kerren, Anders Ynnerman | Published: 2024-09-04 | Updated: 2024-09-24 Backdoor AttackAdversarial ExampleVulnerability of Visualization 2024.09.04 2025.05.27 Literature Database
Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers Authors: Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, Longzhi Yang | Published: 2024-09-01 PoisoningAdversarial ExampleEvaluation Method 2024.09.01 2025.05.27 Literature Database