Convergence of Adversarial Training in Overparametrized Neural Networks Authors: Ruiqi Gao, Tianle Cai, Haochuan Li, Liwei Wang, Cho-Jui Hsieh, Jason D. Lee | Published: 2019-06-19 | Updated: 2019-11-09 robustness requirementsAdversarial ExampleDeep Learning Method 2019.06.19 2025.05.28 Literature Database
Real or Fake? Learning to Discriminate Machine from Human Generated Text Authors: Anton Bakhtin, Sam Gross, Myle Ott, Yuntian Deng, Marc'Aurelio Ranzato, Arthur Szlam | Published: 2019-06-07 | Updated: 2019-11-25 Identification of AI OutputEnergy-Based ModelDeep Learning Method 2019.06.07 2025.05.28 Literature Database
Can You Trust Your Model’s Uncertainty? Evaluating Predictive Uncertainty Under Dataset Shift Authors: Yaniv Ovadia, Emily Fertig, Jie Ren, Zachary Nado, D Sculley, Sebastian Nowozin, Joshua V. Dillon, Balaji Lakshminarayanan, Jasper Snoek | Published: 2019-06-06 | Updated: 2019-12-17 Quantification of UncertaintyUncertainty AssessmentDeep Learning Method 2019.06.06 2025.05.28 Literature Database
Fast and Stable Interval Bounds Propagation for Training Verifiably Robust Models Authors: Paweł Morawiecki, Przemysław Spurek, Marek Śmieja, Jacek Tabor | Published: 2019-06-03 | Updated: 2019-07-03 Robustness Verification MethodExpression of GratitudeDeep Learning Method 2019.06.03 2025.05.28 Literature Database
IoT Network Security from the Perspective of Adversarial Deep Learning Authors: Yalin E. Sagduyu, Yi Shi, Tugba Erpek | Published: 2019-05-31 Adversarial ExampleAdversarial Spectrum Attack DetectionDeep Learning Method 2019.05.31 2025.05.28 Literature Database
Unlabeled Data Improves Adversarial Robustness Authors: Yair Carmon, Aditi Raghunathan, Ludwig Schmidt, Percy Liang, John C. Duchi | Published: 2019-05-31 | Updated: 2022-01-13 PoisoningRobustness Verification MethodDeep Learning Method 2019.05.31 2025.05.28 Literature Database
L0 Regularization Based Neural Network Design and Compression Authors: S. Asim Ahmed | Published: 2019-05-31 Optimization StrategyDeep Learning MethodDeep Learning Technology 2019.05.31 2025.05.28 Literature Database
Defending Against Neural Fake News Authors: Rowan Zellers, Ari Holtzman, Hannah Rashkin, Yonatan Bisk, Ali Farhadi, Franziska Roesner, Yejin Choi | Published: 2019-05-29 | Updated: 2020-12-11 Identification of AI OutputCyber ThreatDeep Learning Method 2019.05.29 2025.05.28 Literature Database
A Compendium on Network and Host based Intrusion Detection Systems Authors: Rahul-Vigneswaran K, Prabaharan Poornachandran, Soman KP | Published: 2019-04-06 Machine Learning AlgorithmMachine Learning ApplicationDeep Learning Method 2019.04.06 2025.05.28 Literature Database
Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks Authors: Fatemeh Sheikholeslami, Swayambhoo Jain, Georgios B. Giannakis | Published: 2019-04-05 | Updated: 2020-10-15 Adversarial attackMachine Learning AlgorithmDeep Learning Method 2019.04.05 2025.05.28 Literature Database