Adversarial Robustness of Stabilized NeuralODEs Might be from Obfuscated Gradients Authors: Yifei Huang, Yaodong Yu, Hongyang Zhang, Yi Ma, Yuan Yao | Published: 2020-09-28 | Updated: 2021-06-02 PoisoningRelationship between Robustness and PrivacyDeep Learning 2020.09.28 2025.05.28 Literature Database
Beneficial Perturbations Network for Defending Adversarial Examples Authors: Shixian Wen, Amanda Rios, Laurent Itti | Published: 2020-09-27 | Updated: 2021-09-13 Adversarial ExampleVulnerability of Adversarial ExamplesDeep Learning 2020.09.27 2025.05.28 Literature Database
Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning Authors: Yinghua Zhang, Yangqiu Song, Jian Liang, Kun Bai, Qiang Yang | Published: 2020-08-25 PoisoningAdversarial LearningDeep Learning 2020.08.25 2025.05.28 Literature Database
Multiple Classification with Split Learning Authors: Jongwon Kim, Sungho Shin, Yeonguk Yu, Junseok Lee, Kyoobin Lee | Published: 2020-08-22 | Updated: 2020-09-11 Reconstruction AttackDeep LearningDeep Learning Method 2020.08.22 2025.05.28 Literature Database
NoPeek: Information leakage reduction to share activations in distributed deep learning Authors: Praneeth Vepakomma, Abhishek Singh, Otkrist Gupta, Ramesh Raskar | Published: 2020-08-20 Information Leakage AnalysisAdversarial ExampleDeep Learning 2020.08.20 2025.05.28 Literature Database
Towards adversarial robustness with 01 loss neural networks Authors: Yunzhe Xue, Meiyan Xie, Usman Roshan | Published: 2020-08-20 Adversarial Spectrum Attack DetectionDeep LearningComputational Complexity 2020.08.20 2025.05.28 Literature Database
GraphReach: Position-Aware Graph Neural Network using Reachability Estimations Authors: Sunil Nishad, Shubhangi Agarwal, Arnab Bhattacharya, Sayan Ranu | Published: 2020-08-19 | Updated: 2021-08-20 Graph TransformationDeep LearningDeep Learning Method 2020.08.19 2025.05.28 Literature Database
Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-07-31 PoisoningAttack MethodDeep Learning 2020.07.31 2025.05.28 Literature Database
Black-box Adversarial Sample Generation Based on Differential Evolution Authors: Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang | Published: 2020-07-30 Attack MethodDeep LearningResearch Methodology 2020.07.30 2025.05.28 Literature Database
DeepPeep: Exploiting Design Ramifications to Decipher the Architecture of Compact DNNs Authors: Nandan Kumar Jha, Sparsh Mittal, Binod Kumar, Govardhan Mattela | Published: 2020-07-30 Performance EvaluationDeep LearningComputational Efficiency 2020.07.30 2025.05.28 Literature Database