Detecting and Diagnosing Adversarial Images with Class-Conditional Capsule Reconstructions Authors: Yao Qin, Nicholas Frosst, Sara Sabour, Colin Raffel, Garrison Cottrell, Geoffrey Hinton | Published: 2019-07-05 | Updated: 2020-02-18 Adversarial ExampleAdversarial attackDeep Learning Method 2019.07.05 2025.05.28 Literature Database
Adversarial Robustness via Label-Smoothing Authors: Morgane Goibert, Elvis Dohmatob | Published: 2019-06-27 | Updated: 2019-10-15 Adversarial ExampleAdversarial attackDeep Learning Method 2019.06.27 2025.05.28 Literature Database
Adversarial Examples to Fool Iris Recognition Systems Authors: Sobhan Soleymani, Ali Dabouei, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2019-06-21 | Updated: 2019-07-18 Adversarial ExampleAdversarial attackDeep Learning Method 2019.06.21 2025.05.28 Literature Database
Convergence of Adversarial Training in Overparametrized Neural Networks Authors: Ruiqi Gao, Tianle Cai, Haochuan Li, Liwei Wang, Cho-Jui Hsieh, Jason D. Lee | Published: 2019-06-19 | Updated: 2019-11-09 robustness requirementsAdversarial ExampleDeep Learning Method 2019.06.19 2025.05.28 Literature Database
Adversarial Robustness Assessment: Why both $L_0$ and $L_\infty$ Attacks Are Necessary Authors: Shashank Kotyan, Danilo Vasconcellos Vargas | Published: 2019-06-14 | Updated: 2020-07-16 Adversarial ExampleAdversarial LearningDefense Method 2019.06.14 2025.05.28 Literature Database
Adversarial Explanations for Understanding Image Classification Decisions and Improved Neural Network Robustness Authors: Walt Woods, Jack Chen, Christof Teuscher | Published: 2019-06-07 | Updated: 2019-08-06 PoisoningAdversarial ExampleAdversarial Training 2019.06.07 2025.05.28 Literature Database
DAWN: Dynamic Adversarial Watermarking of Neural Networks Authors: Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan | Published: 2019-06-03 | Updated: 2021-07-16 Membership InferenceAdversarial ExampleWatermarking Technology 2019.06.03 2025.05.28 Literature Database
IoT Network Security from the Perspective of Adversarial Deep Learning Authors: Yalin E. Sagduyu, Yi Shi, Tugba Erpek | Published: 2019-05-31 Adversarial ExampleAdversarial Spectrum Attack DetectionDeep Learning Method 2019.05.31 2025.05.28 Literature Database
Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and The Way Forward Authors: Adnan Qayyum, Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-05-29 Backdoor AttackAdversarial ExampleAdversarial Attack Methods 2019.05.29 2025.05.28 Literature Database
Improving the Robustness of Deep Neural Networks via Adversarial Training with Triplet Loss Authors: Pengcheng Li, Jinfeng Yi, Bowen Zhou, Lijun Zhang | Published: 2019-05-28 PoisoningAdversarial ExampleAdversarial Learning 2019.05.28 2025.05.28 Literature Database