Trace-Norm Adversarial Examples Authors: Ehsan Kazemi, Thomas Kerdreux, Liqiang Wang | Published: 2020-07-02 Algorithm DesignAdversarial Attack DetectionDefense Mechanism 2020.07.02 2025.05.28 Literature Database
Deep Learning Defenses Against Adversarial Examples for Dynamic Risk Assessment Authors: Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, Ines Goicoechea-Telleria, Raul Orduna-Urrutia | Published: 2020-07-02 Adversarial ExampleAdversarial Attack MethodsDefense Mechanism 2020.07.02 2025.05.28 Literature Database
FDA3 : Federated Defense Against Adversarial Attacks for Cloud-Based IIoT Applications Authors: Yunfei Song, Tian Liu, Tongquan Wei, Xiangfeng Wang, Zhe Tao, Mingsong Chen | Published: 2020-06-28 Adversarial ExampleAdversarial attackDefense Mechanism 2020.06.28 2025.05.28 Literature Database
Deep Partition Aggregation: Provable Defense against General Poisoning Attacks Authors: Alexander Levine, Soheil Feizi | Published: 2020-06-26 | Updated: 2021-03-18 Algorithm DesignPoisoningDefense Mechanism 2020.06.26 2025.05.28 Literature Database
Perceptual Adversarial Robustness: Defense Against Unseen Threat Models Authors: Cassidy Laidlaw, Sahil Singla, Soheil Feizi | Published: 2020-06-22 | Updated: 2021-07-04 PoisoningAdversarial Attack MethodsDefense Mechanism 2020.06.22 2025.05.28 Literature Database
Learning to Generate Noise for Multi-Attack Robustness Authors: Divyam Madaan, Jinwoo Shin, Sung Ju Hwang | Published: 2020-06-22 | Updated: 2021-06-24 Adversarial Perturbation TechniquesAdversarial Attack MethodsDefense Mechanism 2020.06.22 2025.05.28 Literature Database
Systematic Attack Surface Reduction For Deployed Sentiment Analysis Models Authors: Josh Kalin, David Noever, Gerry Dozier | Published: 2020-06-19 Attack MethodAdversarial LearningDefense Mechanism 2020.06.19 2025.05.28 Literature Database
Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples Authors: Kaleel Mahmood, Deniz Gurevin, Marten van Dijk, Phuong Ha Nguyen | Published: 2020-06-18 | Updated: 2021-05-20 Adversarial ExampleAdversarial attackDefense Mechanism 2020.06.18 2025.05.28 Literature Database
Adversarial Training is a Form of Data-dependent Operator Norm Regularization Authors: Kevin Roth, Yannic Kilcher, Thomas Hofmann | Published: 2019-06-04 | Updated: 2020-10-23 Adversarial TrainingDeep Learning TechnologyDefense Mechanism 2019.06.04 2025.05.28 Literature Database
Unrestricted Adversarial Examples Authors: Tom B. Brown, Nicholas Carlini, Chiyuan Zhang, Catherine Olsson, Paul Christiano, Ian Goodfellow | Published: 2018-09-22 Robustness Improvement MethodAdversarial Attack MethodsDefense Mechanism 2018.09.22 2025.05.28 Literature Database