Defense Method

Black-Box Certification with Randomized Smoothing: A Functional Optimization Based Framework

Authors: Dinghuai Zhang, Mao Ye, Chengyue Gong, Zhanxing Zhu, Qiang Liu | Published: 2020-02-21 | Updated: 2020-10-20
Robustness Evaluation
Optimization Problem
Defense Method

Enhanced Adversarial Strategically-Timed Attacks against Deep Reinforcement Learning

Authors: Chao-Han Huck Yang, Jun Qi, Pin-Yu Chen, Yi Ouyang, I-Te Danny Hung, Chin-Hui Lee, Xiaoli Ma | Published: 2020-02-20
Reward Mechanism Design
Vulnerability Prediction
Defense Method

Towards Certifiable Adversarial Sample Detection

Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2020-02-20
Adversarial Example
Regularization
Defense Method

On Adaptive Attacks to Adversarial Example Defenses

Authors: Florian Tramer, Nicholas Carlini, Wieland Brendel, Aleksander Madry | Published: 2020-02-19 | Updated: 2020-10-23
Robustness Evaluation
Adversarial Example
Defense Method

Deflecting Adversarial Attacks

Authors: Yao Qin, Nicholas Frosst, Colin Raffel, Garrison Cottrell, Geoffrey Hinton | Published: 2020-02-18
Poisoning
Adversarial Attack Detection
Defense Method

TensorShield: Tensor-based Defense Against Adversarial Attacks on Images

Authors: Negin Entezari, Evangelos E. Papalexakis | Published: 2020-02-18
Performance Evaluation
Adversarial Example
Defense Method

Data and Model Dependencies of Membership Inference Attack

Authors: Shakila Mahjabin Tonni, Dinusha Vatsalan, Farhad Farokhi, Dali Kaafar, Zhigang Lu, Gioacchino Tangari | Published: 2020-02-17 | Updated: 2020-07-25
Training Method
Model Selection Method
Defense Method

Undersensitivity in Neural Reading Comprehension

Authors: Johannes Welbl, Pasquale Minervini, Max Bartolo, Pontus Stenetorp, Sebastian Riedel | Published: 2020-02-15
Training Method
Vulnerability Attack Method
Defense Method

Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets

Authors: Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey, Xingjun Ma | Published: 2020-02-14
Poisoning
Adversarial Attack Detection
Defense Method

Politics of Adversarial Machine Learning

Authors: Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar | Published: 2020-02-01 | Updated: 2020-04-26
Membership Inference
Human Rights and Technology
Defense Method