Are adversarial examples inevitable? Authors: Ali Shafahi, W. Ronny Huang, Christoph Studer, Soheil Feizi, Tom Goldstein | Published: 2018-09-06 | Updated: 2020-02-03 Robustness AnalysisAdversarial ExampleAdversarial Example Detection 2018.09.06 2025.05.28 Literature Database
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection Authors: Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren | Published: 2018-08-10 | Updated: 2021-11-16 Differential PrivacyAdversarial ExampleAdversarial attack 2018.08.10 2025.05.28 Literature Database
DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes Authors: Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar | Published: 2018-08-03 | Updated: 2020-04-23 Certified RobustnessAdversarial ExampleAdversarial attack 2018.08.03 2025.05.28 Literature Database
Limitations of the Lipschitz constant as a defense against adversarial examples Authors: Todd Huster, Cho-Yu Jason Chiang, Ritu Chadha | Published: 2018-07-25 Model EvaluationRobustness EvaluationAdversarial Example 2018.07.25 2025.05.28 Literature Database
Motivating the Rules of the Game for Adversarial Example Research Authors: Justin Gilmer, Ryan P. Adams, Ian Goodfellow, David Andersen, George E. Dahl | Published: 2018-07-18 | Updated: 2018-07-20 Certified RobustnessAdversarial ExampleAdversarial attack 2018.07.18 2025.05.28 Literature Database
Adversarial Perturbations Against Real-Time Video Classification Systems Authors: Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy Chowdhury, Ananthram Swami | Published: 2018-07-02 Dual-Purpose Universal PerturbationsEffective Perturbation MethodsAdversarial Example 2018.07.02 2025.05.28 Literature Database
Adversarial Reprogramming of Neural Networks Authors: Gamaleldin F. Elsayed, Ian Goodfellow, Jascha Sohl-Dickstein | Published: 2018-06-28 | Updated: 2018-11-29 Certified RobustnessAdversarial ExampleWatermark 2018.06.28 2025.05.28 Literature Database
Adversarial Distillation of Bayesian Neural Network Posteriors Authors: Kuan-Chieh Wang, Paul Vicol, James Lucas, Li Gu, Roger Grosse, Richard Zemel | Published: 2018-06-27 Certified RobustnessAdversarial ExampleDeep Learning Technology 2018.06.27 2025.05.28 Literature Database
Hardware Trojan Attacks on Neural Networks Authors: Joseph Clements, Yingjie Lao | Published: 2018-06-14 Trigger DetectionAdversarial ExampleDeep Learning Technology 2018.06.14 2025.05.28 Literature Database
Defense Against the Dark Arts: An overview of adversarial example security research and future research directions Authors: Ian Goodfellow | Published: 2018-06-11 Certified RobustnessAdversarial ExampleAdversarial Training 2018.06.11 2025.05.28 Literature Database