Mitigation of Policy Manipulation Attacks on Deep Q-Networks with Parameter-Space Noise Authors: Vahid Behzadan, Arslan Munir | Published: 2018-06-04 Certified RobustnessReinforcement LearningAdversarial Example 2018.06.04 2025.05.28 Literature Database
Sufficient Conditions for Idealised Models to Have No Adversarial Examples: a Theoretical and Empirical Study with Bayesian Neural Networks Authors: Yarin Gal, Lewis Smith | Published: 2018-06-02 | Updated: 2018-06-28 Label UncertaintyAdversarial ExampleAdversarial Transferability 2018.06.02 2025.05.28 Literature Database
Resisting Adversarial Attacks using Gaussian Mixture Variational Autoencoders Authors: Partha Ghosh, Arpan Losalka, Michael J Black | Published: 2018-05-31 | Updated: 2018-12-10 Certified RobustnessLoss FunctionAdversarial Example 2018.05.31 2025.05.28 Literature Database
Knowledge Distillation with Adversarial Samples Supporting Decision Boundary Authors: Byeongho Heo, Minsik Lee, Sangdoo Yun, Jin Young Choi | Published: 2018-05-15 | Updated: 2018-12-14 Adversarial ExampleAdversarial Attack DetectionKnowledge Distillation 2018.05.15 2025.05.28 Literature Database
Detecting Adversarial Samples for Deep Neural Networks through Mutation Testing Authors: Jingyi Wang, Jun Sun, Peixin Zhang, Xinyu Wang | Published: 2018-05-14 | Updated: 2018-05-17 Certified RobustnessAdversarial ExampleAdversarial Attack Detection 2018.05.14 2025.05.28 Literature Database
Black-box Adversarial Attacks with Limited Queries and Information Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin | Published: 2018-04-23 | Updated: 2018-07-11 Model Extraction AttackAdversarial ExampleAdversarial Attack Methods 2018.04.23 2025.05.28 Literature Database
An ADMM-Based Universal Framework for Adversarial Attacks on Deep Neural Networks Authors: Pu Zhao, Sijia Liu, Yanzhi Wang, Xue Lin | Published: 2018-04-09 Backdoor DetectionAdversarial ExampleAdversarial attack 2018.04.09 2025.05.28 Literature Database
Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks Authors: Octavian Suciu, Radu Mărginean, Yiğitcan Kaya, Hal Daumé III, Tudor Dumitraş | Published: 2018-03-19 | Updated: 2019-03-08 Performance Evaluation MetricsAdversarial ExampleAdversarial Learning 2018.03.19 2025.05.28 Literature Database
Vulnerability of Deep Learning Authors: Richard Kenway | Published: 2018-03-16 Convergence PropertyAdversarial ExampleAdversarial Learning 2018.03.16 2025.05.28 Literature Database
Detecting Adversarial Examples – A Lesson from Multimedia Forensics Authors: Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme | Published: 2018-03-09 Adversarial ExampleAdversarial Example DetectionAdversarial Attack Methods 2018.03.09 2025.05.28 Literature Database