Watermarking Technology

Local Convolutions Cause an Implicit Bias towards High Frequency Adversarial Examples

Authors: Josue Ortega Caro, Yilong Ju, Ryan Pyle, Sourav Dey, Wieland Brendel, Fabio Anselmi, Ankit Patel | Published: 2020-06-19 | Updated: 2023-03-08
Adversarial Example
Adversarial Learning
Watermarking Technology

Robust Federated Recommendation System

Authors: Chen Chen, Jingfeng Zhang, Anthony K. H. Tung, Mohan Kankanhalli, Gang Chen | Published: 2020-06-15
Algorithm Design
Poisoning
Watermarking Technology

Confusing and Detecting ML Adversarial Attacks with Injected Attractors

Authors: Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee | Published: 2020-03-05 | Updated: 2021-03-08
Adversarial Perturbation Techniques
Watermarking Technology
Defense Method

Detecting and Correcting Adversarial Images Using Image Processing Operations

Authors: Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen | Published: 2019-12-11 | Updated: 2019-12-30
Adversarial Spectrum Attack Detection
Deep Learning Method
Watermarking Technology

Robustness properties of Facebook’s ResNeXt WSL models

Authors: A. Emin Orhan | Published: 2019-07-17 | Updated: 2019-12-09
Adversarial Attack Methods
Deep Learning Technology
Watermarking Technology

DAWN: Dynamic Adversarial Watermarking of Neural Networks

Authors: Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan | Published: 2019-06-03 | Updated: 2021-07-16
Membership Inference
Adversarial Example
Watermarking Technology

TensorSCONE: A Secure TensorFlow Framework using Intel SGX

Authors: Roland Kunkel, Do Le Quoc, Franz Gregor, Sergei Arnautov, Pramod Bhatotia, Christof Fetzer | Published: 2019-02-12
Performance Evaluation
Threat Model
Watermarking Technology

How Robust are Deep Neural Networks?

Authors: Biswa Sengupta, Karl J. Friston | Published: 2018-04-30
Certified Robustness
Deep Learning-Based IDS
Watermarking Technology

t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification

Authors: Tomi Kinnunen, Kong Aik Lee, Hector Delgado, Nicholas Evans, Massimiliano Todisco, Md Sahidullah, Junichi Yamagishi, Douglas A. Reynolds | Published: 2018-04-25 | Updated: 2019-04-11
Performance Evaluation Method
Watermarking Technology
Security of Voice Recognition Systems

Gradient Masking Causes CLEVER to Overestimate Adversarial Perturbation Size

Authors: Ian Goodfellow | Published: 2018-04-21
Adversarial Learning
Adversarial Attack Methods
Watermarking Technology