Defense Method

Automatic Perturbation Analysis for Scalable Certified Robustness and Beyond

Authors: Kaidi Xu, Zhouxing Shi, Huan Zhang, Yihan Wang, Kai-Wei Chang, Minlie Huang, Bhavya Kailkhura, Xue Lin, Cho-Jui Hsieh | Published: 2020-02-28 | Updated: 2020-10-26
Robustness Evaluation
Vulnerability Analysis
Defense Method

Certified Defense to Image Transformations via Randomized Smoothing

Authors: Marc Fischer, Maximilian Baader, Martin Vechev | Published: 2020-02-27 | Updated: 2021-08-25
Robustness Evaluation
Computational Consistency
Defense Method

Entangled Watermarks as a Defense against Model Extraction

Authors: Hengrui Jia, Christopher A. Choquette-Choo, Varun Chandrasekaran, Nicolas Papernot | Published: 2020-02-27 | Updated: 2021-02-19
DNN IP Protection Method
Robustness Evaluation
Defense Method

Adversarial Perturbations Prevail in the Y-Channel of the YCbCr Color Space

Authors: Camilo Pestana, Naveed Akhtar, Wei Liu, David Glance, Ajmal Mian | Published: 2020-02-25
Robustness Evaluation
Adversarial Learning
Defense Method

An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning

Authors: Xue Yang, Yan Feng, Weijun Fang, Jun Shao, Xiaohu Tang, Shu-Tao Xia, Rongxing Lu | Published: 2020-02-23 | Updated: 2021-08-15
Privacy Protection Mechanism
Federated Learning
Defense Method

Non-Intrusive Detection of Adversarial Deep Learning Attacks via Observer Networks

Authors: Kirthi Shankar Sivamani, Rajeev Sahay, Aly El Gamal | Published: 2020-02-22
Performance Evaluation
Adversarial Training
Defense Method

Robustness from Simple Classifiers

Authors: Sharon Qian, Dimitris Kalimeris, Gal Kaplun, Yaron Singer | Published: 2020-02-21
Robustness Evaluation
Adversarial Training
Defense Method

Adversarial Detection and Correction by Matching Prediction Distributions

Authors: Giovanni Vacanti, Arnaud Van Looveren | Published: 2020-02-21
Advice Provision
Adversarial Training
Defense Method

Black-Box Certification with Randomized Smoothing: A Functional Optimization Based Framework

Authors: Dinghuai Zhang, Mao Ye, Chengyue Gong, Zhanxing Zhu, Qiang Liu | Published: 2020-02-21 | Updated: 2020-10-20
Robustness Evaluation
Optimization Problem
Defense Method

Enhanced Adversarial Strategically-Timed Attacks against Deep Reinforcement Learning

Authors: Chao-Han Huck Yang, Jun Qi, Pin-Yu Chen, Yi Ouyang, I-Te Danny Hung, Chin-Hui Lee, Xiaoli Ma | Published: 2020-02-20
Reward Mechanism Design
Vulnerability Prediction
Defense Method