Generative Model

Can 3D Adversarial Logos Cloak Humans?

Authors: Yi Wang, Jingyang Zhou, Tianlong Chen, Sijia Liu, Shiyu Chang, Chandrajit Bajaj, Zhangyang Wang | Published: 2020-06-25 | Updated: 2020-11-27
Logo Transformation Method
Adversarial attack
Generative Model

Botnet Detection Using Recurrent Variational Autoencoder

Authors: Jeeyung Kim, Alex Sim, Jinoh Kim, Kesheng Wu | Published: 2020-04-01
Malware Detection Method
Machine Learning Application
Generative Model

Gradient-based adversarial attacks on categorical sequence models via traversing an embedded world

Authors: Ivan Fursov, Alexey Zaytsev, Nikita Kluchnikov, Andrey Kravchenko, Evgeny Burnaev | Published: 2020-03-09 | Updated: 2020-10-12
Adversarial Example
Adversarial attack
Generative Model

Federated Generative Privacy

Authors: Aleksei Triastcyn, Boi Faltings | Published: 2019-10-18
Privacy Protection Method
Privacy Assessment
Generative Model

Mapper Based Classifier

Authors: Jacek Cyranka, Alexander Georges, David Meyer | Published: 2019-10-17 | Updated: 2019-10-21
Model Robustness
Deep Learning
Generative Model

Reverse KL-Divergence Training of Prior Networks: Improved Uncertainty and Adversarial Robustness

Authors: Andrey Malinin, Mark Gales | Published: 2019-05-31 | Updated: 2019-12-02
Poisoning
Uncertainty Estimation
Generative Model

Accelerating Monte Carlo Bayesian Inference via Approximating Predictive Uncertainty over Simplex

Authors: Yufei Cui, Wuguannan Yao, Qiao Li, Antoni B. Chan, Chun Jason Xue | Published: 2019-05-29 | Updated: 2019-09-26
Quantification of Uncertainty
Generative Model

Controlling Neural Level Sets

Authors: Matan Atzmon, Niv Haim, Lior Yariv, Ofer Israelov, Haggai Maron, Yaron Lipman | Published: 2019-05-28 | Updated: 2019-10-27
Model Evaluation
Optimization Problem
Generative Model

Fast Geometrically-Perturbed Adversarial Faces

Authors: Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2018-09-24 | Updated: 2018-09-28
Robustness Improvement Method
Adversarial Attack Methods
Generative Model

Adversarial Recommendation: Attack of the Learned Fake Users

Authors: Konstantina Christakopoulou, Arindam Banerjee | Published: 2018-09-21
Adversarial Example
Adversarial Attack Methods
Generative Model