Deep Neural Network Ensembles against Deception: Ensemble Diversity, Accuracy and Robustness Authors: Ling Liu, Wenqi Wei, Ka-Ho Chow, Margaret Loper, Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2019-08-29 Robustness Verification MethodAdversarial ExampleMachine Learning Application 2019.08.29 2025.05.28 Literature Database
Adversarial Edit Attacks for Tree Data Authors: Benjamin Paaßen | Published: 2019-08-25 | Updated: 2019-08-27 Adversarial ExampleAdversarial Attack DetectionMachine Learning Application 2019.08.25 2025.05.28 Literature Database
Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks Authors: Ka-Ho Chow, Wenqi Wei, Yanzhao Wu, Ling Liu | Published: 2019-08-21 | Updated: 2019-10-26 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2019.08.21 2025.05.28 Literature Database
Verification of Neural Network Control Policy Under Persistent Adversarial Perturbation Authors: Yuh-Shyang Wang, Tsui-Wei Weng, Luca Daniel | Published: 2019-08-18 Robustness Improvement MethodAdversarial ExampleDeep Reinforcement Learning 2019.08.18 2025.05.28 Literature Database
On the Adversarial Robustness of Neural Networks without Weight Transport Authors: Mohamed Akrout | Published: 2019-08-09 | Updated: 2019-10-03 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2019.08.09 2025.05.28 Literature Database
Defending Against Adversarial Iris Examples Using Wavelet Decomposition Authors: Sobhan Soleymani, Ali Dabouei, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2019-08-08 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2019.08.08 2025.05.28 Literature Database
Universal Adversarial Audio Perturbations Authors: Sajjad Abdoli, Luiz G. Hafemann, Jerome Rony, Ismail Ben Ayed, Patrick Cardinal, Alessandro L. Koerich | Published: 2019-08-08 | Updated: 2020-11-17 Adversarial ExampleAdversarial Attack MethodsSpeech Signal Processing 2019.08.08 2025.05.28 Literature Database
Investigating Decision Boundaries of Trained Neural Networks Authors: Roozbeh Yousefzadeh, Dianne P O'Leary | Published: 2019-08-07 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2019.08.07 2025.05.28 Literature Database
Impact of Adversarial Examples on Deep Learning Models for Biomedical Image Segmentation Authors: Utku Ozbulak, Arnout Van Messem, Wesley De Neve | Published: 2019-07-30 Medical Image AnalysisAdversarial ExampleAdversarial Training 2019.07.30 2025.05.28 Literature Database
Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding Authors: Utku Ozbulak, Arnout Van Messem, Wesley De Neve | Published: 2019-07-30 Taxonomy of AttacksAdversarial ExampleAdversarial Learning 2019.07.30 2025.05.28 Literature Database