ATOM: Robustifying Out-of-distribution Detection Using Outlier Mining Authors: Jiefeng Chen, Yixuan Li, Xi Wu, Yingyu Liang, Somesh Jha | Published: 2020-06-26 | Updated: 2021-06-30 Out-of-Distribution DetectionAdversarial Example DetectionAdversarial attack 2020.06.26 2025.05.28 Literature Database
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods? Authors: Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu | Published: 2020-06-26 | Updated: 2022-07-28 Backdoor AttackAdversarial Example DetectionAdversarial attack 2020.06.26 2025.05.28 Literature Database
Orthogonal Deep Models As Defense Against Black-Box Attacks Authors: Mohammad A. A. K. Jalwana, Naveed Akhtar, Mohammed Bennamoun, Ajmal Mian | Published: 2020-06-26 PoisoningAdversarial ExampleAdversarial attack 2020.06.26 2025.05.28 Literature Database
Proper Network Interpretability Helps Adversarial Robustness in Classification Authors: Akhilan Boopathy, Sijia Liu, Gaoyuan Zhang, Cynthia Liu, Pin-Yu Chen, Shiyu Chang, Luca Daniel | Published: 2020-06-26 | Updated: 2020-10-21 Adversarial ExampleAdversarial attackInterpretation Method 2020.06.26 2025.05.28 Literature Database
Can 3D Adversarial Logos Cloak Humans? Authors: Yi Wang, Jingyang Zhou, Tianlong Chen, Sijia Liu, Shiyu Chang, Chandrajit Bajaj, Zhangyang Wang | Published: 2020-06-25 | Updated: 2020-11-27 Logo Transformation MethodAdversarial attackGenerative Model 2020.06.25 2025.05.28 Literature Database
Network Moments: Extensions and Sparse-Smooth Attacks Authors: Modar Alfadly, Adel Bibi, Emilio Botero, Salman Alsubaihi, Bernard Ghanem | Published: 2020-06-21 Adversarial attackDeep Learning MethodStatistical Methods 2020.06.21 2025.05.28 Literature Database
Towards an Adversarially Robust Normalization Approach Authors: Muhammad Awais, Fahad Shamshad, Sung-Ho Bae | Published: 2020-06-19 Hyperparameter OptimizationAdversarial LearningAdversarial attack 2020.06.19 2025.05.28 Literature Database
Adversarial Attacks for Multi-view Deep Models Authors: Xuli Sun, Shiliang Sun | Published: 2020-06-19 Attack MethodAdversarial ExampleAdversarial attack 2020.06.19 2025.05.28 Literature Database
Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples Authors: Kaleel Mahmood, Deniz Gurevin, Marten van Dijk, Phuong Ha Nguyen | Published: 2020-06-18 | Updated: 2021-05-20 Adversarial ExampleAdversarial attackDefense Mechanism 2020.06.18 2025.05.28 Literature Database
GNNGuard: Defending Graph Neural Networks against Adversarial Attacks Authors: Xiang Zhang, Marinka Zitnik | Published: 2020-06-15 | Updated: 2020-10-28 Graph Neural NetworkAdversarial attackContent Specialized for Toxicity Attacks 2020.06.15 2025.05.28 Literature Database