Local Convolutions Cause an Implicit Bias towards High Frequency Adversarial Examples Authors: Josue Ortega Caro, Yilong Ju, Ryan Pyle, Sourav Dey, Wieland Brendel, Fabio Anselmi, Ankit Patel | Published: 2020-06-19 | Updated: 2023-03-08 Adversarial ExampleAdversarial LearningWatermarking Technology 2020.06.19 2025.05.28 Literature Database
Robust Federated Recommendation System Authors: Chen Chen, Jingfeng Zhang, Anthony K. H. Tung, Mohan Kankanhalli, Gang Chen | Published: 2020-06-15 Algorithm DesignPoisoningWatermarking Technology 2020.06.15 2025.05.28 Literature Database
Confusing and Detecting ML Adversarial Attacks with Injected Attractors Authors: Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee | Published: 2020-03-05 | Updated: 2021-03-08 Adversarial Perturbation TechniquesWatermarking TechnologyDefense Method 2020.03.05 2025.05.28 Literature Database
Detecting and Correcting Adversarial Images Using Image Processing Operations Authors: Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen | Published: 2019-12-11 | Updated: 2019-12-30 Adversarial Spectrum Attack DetectionDeep Learning MethodWatermarking Technology 2019.12.11 2025.05.28 Literature Database
Robustness properties of Facebook’s ResNeXt WSL models Authors: A. Emin Orhan | Published: 2019-07-17 | Updated: 2019-12-09 Adversarial Attack MethodsDeep Learning TechnologyWatermarking Technology 2019.07.17 2025.05.28 Literature Database
DAWN: Dynamic Adversarial Watermarking of Neural Networks Authors: Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan | Published: 2019-06-03 | Updated: 2021-07-16 Membership InferenceAdversarial ExampleWatermarking Technology 2019.06.03 2025.05.28 Literature Database
TensorSCONE: A Secure TensorFlow Framework using Intel SGX Authors: Roland Kunkel, Do Le Quoc, Franz Gregor, Sergei Arnautov, Pramod Bhatotia, Christof Fetzer | Published: 2019-02-12 Performance EvaluationThreat ModelWatermarking Technology 2019.02.12 2025.05.28 Literature Database
How Robust are Deep Neural Networks? Authors: Biswa Sengupta, Karl J. Friston | Published: 2018-04-30 Certified RobustnessDeep Learning-Based IDSWatermarking Technology 2018.04.30 2025.05.28 Literature Database
t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification Authors: Tomi Kinnunen, Kong Aik Lee, Hector Delgado, Nicholas Evans, Massimiliano Todisco, Md Sahidullah, Junichi Yamagishi, Douglas A. Reynolds | Published: 2018-04-25 | Updated: 2019-04-11 Performance Evaluation MethodWatermarking TechnologySecurity of Voice Recognition Systems 2018.04.25 2025.05.28 Literature Database
Gradient Masking Causes CLEVER to Overestimate Adversarial Perturbation Size Authors: Ian Goodfellow | Published: 2018-04-21 Adversarial LearningAdversarial Attack MethodsWatermarking Technology 2018.04.21 2025.05.28 Literature Database