Model-Reuse Attacks on Deep Learning Systems Authors: Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2018-12-02 Model Extraction AttackDetection of Model Extraction AttacksAdversarial Learning 2018.12.02 2025.05.28 Literature Database
Robust Classification of Financial Risk Authors: Suproteem K. Sarkar, Kojin Oshiba, Daniel Giebisch, Yaron Singer | Published: 2018-11-27 Model Performance EvaluationRobustness ImprovementAdversarial Learning 2018.11.27 2025.05.28 Literature Database
Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition Authors: Jenn-Bing Ong, Wee-Keong Ng, C. -C. Jay Kuo | Published: 2018-11-20 | Updated: 2018-12-11 Robust ClassificationAdversarial LearningDefense Method 2018.11.20 2025.05.28 Literature Database
Lightweight Lipschitz Margin Training for Certified Defense against Adversarial Examples Authors: Hajime Ono, Tsubasa Takahashi, Kazuya Kakizaki | Published: 2018-11-20 Robustness ImprovementAdversarial LearningDefense Method 2018.11.20 2025.05.28 Literature Database
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning Authors: Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh | Published: 2018-11-08 | Updated: 2019-08-26 PoisoningMalicious Content GenerationAdversarial Learning 2018.11.08 2025.05.28 Literature Database
MixTrain: Scalable Training of Verifiably Robust Neural Networks Authors: Shiqi Wang, Yizheng Chen, Ahmed Abdou, Suman Jana | Published: 2018-11-06 | Updated: 2018-12-01 Model Performance EvaluationRobustness ImprovementAdversarial Learning 2018.11.06 2025.05.28 Literature Database
Learning to Defend by Learning to Attack Authors: Haoming Jiang, Zhehui Chen, Yuyang Shi, Bo Dai, Tuo Zhao | Published: 2018-11-03 | Updated: 2021-05-02 Online LearningRobust OptimizationAdversarial Learning 2018.11.03 2025.05.28 Literature Database
Logit Pairing Methods Can Fool Gradient-Based Attacks Authors: Marius Mosbach, Maksym Andriushchenko, Thomas Trost, Matthias Hein, Dietrich Klakow | Published: 2018-10-29 | Updated: 2019-03-12 robustness requirementsAdversarial LearningAdversarial Training 2018.10.29 2025.05.28 Literature Database
RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications Authors: Huan Zhang, Pengchuan Zhang, Cho-Jui Hsieh | Published: 2018-10-28 | Updated: 2019-02-27 Trigger DetectionMathematical AnalysisAdversarial Learning 2018.10.28 2025.05.28 Literature Database
Evading classifiers in discrete domains with provable optimality guarantees Authors: Bogdan Kulynych, Jamie Hayes, Nikita Samarin, Carmela Troncoso | Published: 2018-10-25 | Updated: 2019-07-01 Certified RobustnessPerformance EvaluationAdversarial Learning 2018.10.25 2025.05.28 Literature Database