Constructing Unrestricted Adversarial Examples with Generative Models Authors: Yang Song, Rui Shu, Nate Kushman, Stefano Ermon | Published: 2018-05-21 | Updated: 2018-12-02 Adversarial LearningAdversarial Attack DetectionGenerative Model 2018.05.21 2025.05.28 Literature Database
Curriculum Adversarial Training Authors: Qi-Zhi Cai, Min Du, Chang Liu, Dawn Song | Published: 2018-05-13 Data CurationModel RobustnessAdversarial Learning 2018.05.13 2025.05.28 Literature Database
Gradient Masking Causes CLEVER to Overestimate Adversarial Perturbation Size Authors: Ian Goodfellow | Published: 2018-04-21 Adversarial LearningAdversarial Attack MethodsWatermarking Technology 2018.04.21 2025.05.28 Literature Database
Learning More Robust Features with Adversarial Training Authors: Shuangtao Li, Yuanke Chen, Yanlin Peng, Lin Bai | Published: 2018-04-20 Adversarial LearningAdversarial LearningWatermarking Technology 2018.04.20 2025.05.28 Literature Database
Adversarial Attacks Against Medical Deep Learning Systems Authors: Samuel G. Finlayson, Hyung Won Chung, Isaac S. Kohane, Andrew L. Beam | Published: 2018-04-15 | Updated: 2019-02-04 Adversarial LearningAdversarial Attack AnalysisDeep Learning 2018.04.15 2025.05.28 Literature Database
Adversarial Training Versus Weight Decay Authors: Angus Galloway, Thomas Tanay, Graham W. Taylor | Published: 2018-04-10 | Updated: 2018-07-23 Certified RobustnessAdversarial LearningAdversarial attack 2018.04.10 2025.05.28 Literature Database
Bypassing Feature Squeezing by Increasing Adversary Strength Authors: Yash Sharma, Pin-Yu Chen | Published: 2018-03-27 Experimental ValidationAdversarial LearningAdversarial attack 2018.03.27 2025.05.28 Literature Database
A Dynamic-Adversarial Mining Approach to the Security of Machine Learning Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Lingyu Lyua, Jiashun Chen | Published: 2018-03-24 Model Extraction AttackDetection of Model Extraction AttacksAdversarial Learning 2018.03.24 2025.05.28 Literature Database
Improving DNN Robustness to Adversarial Attacks using Jacobian Regularization Authors: Daniel Jakubovitz, Raja Giryes | Published: 2018-03-23 | Updated: 2019-05-28 Certified RobustnessAdversarial LearningRegularization 2018.03.23 2025.05.28 Literature Database
Adversarial Defense based on Structure-to-Signal Autoencoders Authors: Joachim Folz, Sebastian Palacio, Joern Hees, Damian Borth, Andreas Dengel | Published: 2018-03-21 PoisoningAdversarial LearningImage Feature Extraction 2018.03.21 2025.05.28 Literature Database