Generalized Byzantine-tolerant SGD Authors: Cong Xie, Oluwasanmi Koyejo, Indranil Gupta | Published: 2018-02-27 | Updated: 2018-03-23 Robust EstimationAdversarial Attack AnalysisMachine Learning Technology 2018.02.27 2025.05.28 Literature Database
Understanding and Enhancing the Transferability of Adversarial Examples Authors: Lei Wu, Zhanxing Zhu, Cheng Tai, Weinan E | Published: 2018-02-27 Model evaluation methodsAdversarial LearningAdversarial Attack Analysis 2018.02.27 2025.05.28 Literature Database
Robust GANs against Dishonest Adversaries Authors: Zhi Xu, Chengtao Li, Stefanie Jegelka | Published: 2018-02-27 | Updated: 2019-10-10 Robust EstimationAdversarial Attack AnalysisAdversarial Training 2018.02.27 2025.05.28 Literature Database
On the Suitability of $L_p$-norms for Creating and Preventing Adversarial Examples Authors: Mahmood Sharif, Lujo Bauer, Michael K. Reiter | Published: 2018-02-27 | Updated: 2018-07-27 Adversarial Example DetectionAdversarial Attack AnalysisMachine Learning Technology 2018.02.27 2025.05.28 Literature Database
Enhanced Attacks on Defensively Distilled Deep Neural Networks Authors: Yujia Liu, Weiming Zhang, Shaohua Li, Nenghai Yu | Published: 2017-11-16 Robustness ImprovementAdversarial ExampleAdversarial Attack Analysis 2017.11.16 2025.05.28 Literature Database
Machine vs Machine: Minimax-Optimal Defense Against Adversarial Examples Authors: Jihun Hamm, Akshay Mehra | Published: 2017-11-12 | Updated: 2018-06-27 Robustness ImprovementAdversarial LearningAdversarial Attack Analysis 2017.11.12 2025.05.28 Literature Database
Interpretation of Neural Networks is Fragile Authors: Amirata Ghorbani, Abubakar Abid, James Zou | Published: 2017-10-29 | Updated: 2018-11-06 Relationship between Robustness and PrivacyAdversarial Attack AnalysisAttacks on Explainability 2017.10.29 2025.05.28 Literature Database