Intriguing Properties of Adversarial Examples Authors: Ekin D. Cubuk, Barret Zoph, Samuel S. Schoenholz, Quoc V. Le | Published: 2017-11-08 Adversarial ExampleAdversarial LearningAdversarial attack 2017.11.08 2025.05.28 Literature Database
Adversarial Frontier Stitching for Remote Neural Network Watermarking Authors: Erwan Le Merrer, Patrick Perez, Gilles Trédan | Published: 2017-11-06 | Updated: 2019-08-07 Adversarial ExampleAdversarial LearningWatermark Design 2017.11.06 2025.05.28 Literature Database
Attacking Binarized Neural Networks Authors: Angus Galloway, Graham W. Taylor, Medhat Moussa | Published: 2017-11-01 | Updated: 2018-01-31 Certified RobustnessRobustness Improvement MethodAdversarial Example 2017.11.01 2025.05.28 Literature Database
One pixel attack for fooling deep neural networks Authors: Jiawei Su, Danilo Vasconcellos Vargas, Sakurai Kouichi | Published: 2017-10-24 | Updated: 2019-10-17 Adversarial ExampleAdversarial Example DetectionStructural Attack 2017.10.24 2025.05.28 Literature Database
EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples Authors: Pin-Yu Chen, Yash Sharma, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh | Published: 2017-09-13 | Updated: 2018-02-10 Certified RobustnessAdversarial LearningAdversarial Example 2017.09.13 2025.05.28 Literature Database
Learning Universal Adversarial Perturbations with Generative Models Authors: Jamie Hayes, George Danezis | Published: 2017-08-17 | Updated: 2018-01-05 Certified RobustnessAttack MethodAdversarial Example 2017.08.17 2025.05.28 Literature Database
Adversarial-Playground: A Visualization Suite Showing How Adversarial Examples Fool Deep Learning Authors: Andrew P. Norton, Yanjun Qi | Published: 2017-08-01 Educational ApproachAdversarial ExampleImage Classification Method 2017.08.01 2025.05.28 Literature Database
NO Need to Worry about Adversarial Examples in Object Detection in Autonomous Vehicles Authors: Jiajun Lu, Hussein Sibai, Evan Fabry, David Forsyth | Published: 2017-07-12 Adversarial ExampleAdversarial Example DetectionImage Processing 2017.07.12 2025.05.28 Literature Database
Towards Deep Learning Models Resistant to Adversarial Attacks Authors: Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, Adrian Vladu | Published: 2017-06-19 | Updated: 2019-09-04 Certified RobustnessRobustness EvaluationAdversarial Example 2017.06.19 2025.05.28 Literature Database
Extending Defensive Distillation Authors: Nicolas Papernot, Patrick McDaniel | Published: 2017-05-15 RobustnessAdversarial ExampleDefense Method 2017.05.15 2025.05.28 Literature Database