Impact of Low-bitwidth Quantization on the Adversarial Robustness for Embedded Neural Networks Authors: Rémi Bernhard, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2019-09-27 | Updated: 2020-07-06 Adversarial ExampleAdversarial attackQuantization and Privacy 2019.09.27 2025.05.28 Literature Database
Mixup Inference: Better Exploiting Mixup to Defend Adversarial Attacks Authors: Tianyu Pang, Kun Xu, Jun Zhu | Published: 2019-09-25 | Updated: 2020-02-20 Model InterpretabilityAdversarial ExampleAdversarial attack 2019.09.25 2025.05.28 Literature Database
COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection Authors: Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen | Published: 2019-09-20 PoisoningAdversarial ExampleAdversarial attack 2019.09.20 2025.05.28 Literature Database
Adversarial Vulnerability Bounds for Gaussian Process Classification Authors: Michael Thomas Smith, Kathrin Grosse, Michael Backes, Mauricio A Alvarez | Published: 2019-09-19 Taxonomy of AttacksAdversarial ExampleMachine Learning Technology 2019.09.19 2025.05.28 Literature Database
Absum: Simple Regularization Method for Reducing Structural Sensitivity of Convolutional Neural Networks Authors: Sekitoshi Kanai, Yasutoshi Ida, Yasuhiro Fujiwara, Masanori Yamada, Shuichi Adachi | Published: 2019-09-19 Experimental ValidationAdversarial ExampleAdversarial attack 2019.09.19 2025.05.28 Literature Database
Adversarial Attacks and Defenses in Images, Graphs and Text: A Review Authors: Han Xu, Yao Ma, Haochen Liu, Debayan Deb, Hui Liu, Jiliang Tang, Anil K. Jain | Published: 2019-09-17 | Updated: 2019-10-09 PoisoningAdversarial ExampleAdversarial attack 2019.09.17 2025.05.28 Literature Database
Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges Authors: Jinyuan Jia, Neil Zhenqiang Gong | Published: 2019-09-17 | Updated: 2019-09-19 Privacy Protection MechanismMembership InferenceAdversarial Example 2019.09.17 2025.05.28 Literature Database
Defending Against Adversarial Attacks by Suppressing the Largest Eigenvalue of Fisher Information Matrix Authors: Chaomin Shen, Yaxin Peng, Guixu Zhang, Jinsong Fan | Published: 2019-09-13 Performance EvaluationAdversarial ExampleAdversarial Learning 2019.09.13 2025.05.28 Literature Database
An Empirical Investigation of Randomized Defenses against Adversarial Attacks Authors: Yannik Potdevin, Dirk Nowotka, Vijay Ganesh | Published: 2019-09-12 Security AnalysisAdversarial ExampleMachine Learning Technology 2019.09.12 2025.05.28 Literature Database
Inspecting adversarial examples using the Fisher information Authors: Jörg Martin, Clemens Elster | Published: 2019-09-12 Fisher Information SensitivityAttack DetectionAdversarial Example 2019.09.12 2025.05.28 Literature Database