Denoised Smoothing: A Provable Defense for Pretrained Classifiers Authors: Hadi Salman, Mingjie Sun, Greg Yang, Ashish Kapoor, J. Zico Kolter | Published: 2020-03-04 | Updated: 2020-09-21 Training MethodRobustness EvaluationDefense Method 2020.03.04 2025.05.28 Literature Database
Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks Authors: Francesco Croce, Matthias Hein | Published: 2020-03-03 | Updated: 2020-08-04 Robustness EvaluationAdversarial Perturbation TechniquesDefense Method 2020.03.03 2025.05.28 Literature Database
Automatic Perturbation Analysis for Scalable Certified Robustness and Beyond Authors: Kaidi Xu, Zhouxing Shi, Huan Zhang, Yihan Wang, Kai-Wei Chang, Minlie Huang, Bhavya Kailkhura, Xue Lin, Cho-Jui Hsieh | Published: 2020-02-28 | Updated: 2020-10-26 Robustness EvaluationVulnerability AnalysisDefense Method 2020.02.28 2025.05.28 Literature Database
Certified Defense to Image Transformations via Randomized Smoothing Authors: Marc Fischer, Maximilian Baader, Martin Vechev | Published: 2020-02-27 | Updated: 2021-08-25 Robustness EvaluationComputational ConsistencyDefense Method 2020.02.27 2025.05.28 Literature Database
Entangled Watermarks as a Defense against Model Extraction Authors: Hengrui Jia, Christopher A. Choquette-Choo, Varun Chandrasekaran, Nicolas Papernot | Published: 2020-02-27 | Updated: 2021-02-19 DNN IP Protection MethodRobustness EvaluationDefense Method 2020.02.27 2025.05.28 Literature Database
Adversarial Perturbations Prevail in the Y-Channel of the YCbCr Color Space Authors: Camilo Pestana, Naveed Akhtar, Wei Liu, David Glance, Ajmal Mian | Published: 2020-02-25 Robustness EvaluationAdversarial LearningDefense Method 2020.02.25 2025.05.28 Literature Database
An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning Authors: Xue Yang, Yan Feng, Weijun Fang, Jun Shao, Xiaohu Tang, Shu-Tao Xia, Rongxing Lu | Published: 2020-02-23 | Updated: 2021-08-15 Privacy Protection MechanismFederated LearningDefense Method 2020.02.23 2025.05.28 Literature Database
Non-Intrusive Detection of Adversarial Deep Learning Attacks via Observer Networks Authors: Kirthi Shankar Sivamani, Rajeev Sahay, Aly El Gamal | Published: 2020-02-22 Performance EvaluationAdversarial TrainingDefense Method 2020.02.22 2025.05.28 Literature Database
Robustness from Simple Classifiers Authors: Sharon Qian, Dimitris Kalimeris, Gal Kaplun, Yaron Singer | Published: 2020-02-21 Robustness EvaluationAdversarial TrainingDefense Method 2020.02.21 2025.05.28 Literature Database
Adversarial Detection and Correction by Matching Prediction Distributions Authors: Giovanni Vacanti, Arnaud Van Looveren | Published: 2020-02-21 Advice ProvisionAdversarial TrainingDefense Method 2020.02.21 2025.05.28 Literature Database