Sparsity Turns Adversarial: Energy and Latency Attacks on Deep Neural Networks Authors: Sarada Krithivasan, Sanchari Sen, Anand Raghunathan | Published: 2020-06-14 | Updated: 2020-09-14 Sparsity OptimizationAdversarial ExampleAdversarial attack 2020.06.14 2025.05.28 Literature Database
Stochastic Security: Adversarial Defense Using Long-Run Dynamics of Energy-Based Models Authors: Mitch Hill, Jonathan Mitchell, Song-Chun Zhu | Published: 2020-05-27 | Updated: 2021-03-18 Adversarial ExampleAdversarial attackMachine Learning Technology 2020.05.27 2025.05.28 Literature Database
Effects of Forward Error Correction on Communications Aware Evasion Attacks Authors: Matthew DelVecchio, Bryse Flowers, William C. Headley | Published: 2020-05-27 Adversarial attackMachine Learning TechnologyCommunication Loss 2020.05.27 2025.05.28 Literature Database
A Protection against the Extraction of Neural Network Models Authors: Hervé Chabanne, Vincent Despiegel, Linda Guiga | Published: 2020-05-26 | Updated: 2020-07-31 Adversarial attackMachine LearningMachine Learning Technology 2020.05.26 2025.05.28 Literature Database
Keyed Non-Parametric Hypothesis Tests Authors: Yao Cheng, Cheng-Kang Chu, Hsiao-Ying Lin, Marius Lombard-Platet, David Naccache | Published: 2020-05-25 PoisoningAdversarial attackMachine Learning Technology 2020.05.25 2025.05.28 Literature Database
Adversarial Feature Selection against Evasion Attacks Authors: Fei Zhang, Patrick P. K. Chan, Battista Biggio, Daniel S. Yeung, Fabio Roli | Published: 2020-05-25 PoisoningAdversarial attackFeature Extraction Method 2020.05.25 2025.05.28 Literature Database
Adversarial Attack on Hierarchical Graph Pooling Neural Networks Authors: Haoteng Tang, Guixiang Ma, Yurong Chen, Lei Guo, Wei Wang, Bo Zeng, Liang Zhan | Published: 2020-05-23 PoisoningAdversarial ExampleAdversarial attack 2020.05.23 2025.05.28 Literature Database
PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking Authors: Chong Xiang, Arjun Nitin Bhagoji, Vikash Sehwag, Prateek Mittal | Published: 2020-05-17 | Updated: 2021-03-31 Robustness AnalysisAdversarial attackFeature Extraction Method 2020.05.17 2025.05.28 Literature Database
Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection Authors: Olga Petrova, Karel Durkota, Galina Alperovich, Karel Horak, Michal Najman, Branislav Bosansky, Viliam Lisy | Published: 2020-04-22 Adversarial attackSelection and Evaluation of Optimization AlgorithmsAnomaly Detection Algorithm 2020.04.22 2025.05.28 Literature Database
Provably robust deep generative models Authors: Filipe Condessa, Zico Kolter | Published: 2020-04-22 Robustness Improvement MethodAdversarial attackDeep Learning Method 2020.04.22 2025.05.28 Literature Database