Black-Box Certification with Randomized Smoothing: A Functional Optimization Based Framework Authors: Dinghuai Zhang, Mao Ye, Chengyue Gong, Zhanxing Zhu, Qiang Liu | Published: 2020-02-21 | Updated: 2020-10-20 Robustness EvaluationOptimization ProblemDefense Method 2020.02.21 2025.05.28 Literature Database
Enhanced Adversarial Strategically-Timed Attacks against Deep Reinforcement Learning Authors: Chao-Han Huck Yang, Jun Qi, Pin-Yu Chen, Yi Ouyang, I-Te Danny Hung, Chin-Hui Lee, Xiaoli Ma | Published: 2020-02-20 Reward Mechanism DesignVulnerability PredictionDefense Method 2020.02.20 2025.05.28 Literature Database
Towards Certifiable Adversarial Sample Detection Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2020-02-20 Adversarial ExampleRegularizationDefense Method 2020.02.20 2025.05.28 Literature Database
On Adaptive Attacks to Adversarial Example Defenses Authors: Florian Tramer, Nicholas Carlini, Wieland Brendel, Aleksander Madry | Published: 2020-02-19 | Updated: 2020-10-23 Robustness EvaluationAdversarial ExampleDefense Method 2020.02.19 2025.05.28 Literature Database
Deflecting Adversarial Attacks Authors: Yao Qin, Nicholas Frosst, Colin Raffel, Garrison Cottrell, Geoffrey Hinton | Published: 2020-02-18 PoisoningAdversarial Attack DetectionDefense Method 2020.02.18 2025.05.28 Literature Database
TensorShield: Tensor-based Defense Against Adversarial Attacks on Images Authors: Negin Entezari, Evangelos E. Papalexakis | Published: 2020-02-18 Performance EvaluationAdversarial ExampleDefense Method 2020.02.18 2025.05.28 Literature Database
Data and Model Dependencies of Membership Inference Attack Authors: Shakila Mahjabin Tonni, Dinusha Vatsalan, Farhad Farokhi, Dali Kaafar, Zhigang Lu, Gioacchino Tangari | Published: 2020-02-17 | Updated: 2020-07-25 Training MethodModel Selection MethodDefense Method 2020.02.17 2025.05.28 Literature Database
Undersensitivity in Neural Reading Comprehension Authors: Johannes Welbl, Pasquale Minervini, Max Bartolo, Pontus Stenetorp, Sebastian Riedel | Published: 2020-02-15 Training MethodVulnerability Attack MethodDefense Method 2020.02.15 2025.05.28 Literature Database
Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets Authors: Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey, Xingjun Ma | Published: 2020-02-14 PoisoningAdversarial Attack DetectionDefense Method 2020.02.14 2025.05.28 Literature Database
Politics of Adversarial Machine Learning Authors: Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar | Published: 2020-02-01 | Updated: 2020-04-26 Membership InferenceHuman Rights and TechnologyDefense Method 2020.02.01 2025.05.28 Literature Database