Adversarial Perturbations Prevail in the Y-Channel of the YCbCr Color Space Authors: Camilo Pestana, Naveed Akhtar, Wei Liu, David Glance, Ajmal Mian | Published: 2020-02-25 Robustness EvaluationAdversarial LearningDefense Method 2020.02.25 2025.05.28 Literature Database
An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning Authors: Xue Yang, Yan Feng, Weijun Fang, Jun Shao, Xiaohu Tang, Shu-Tao Xia, Rongxing Lu | Published: 2020-02-23 | Updated: 2021-08-15 Privacy Protection MechanismFederated LearningDefense Method 2020.02.23 2025.05.28 Literature Database
Non-Intrusive Detection of Adversarial Deep Learning Attacks via Observer Networks Authors: Kirthi Shankar Sivamani, Rajeev Sahay, Aly El Gamal | Published: 2020-02-22 Performance EvaluationAdversarial TrainingDefense Method 2020.02.22 2025.05.28 Literature Database
Robustness from Simple Classifiers Authors: Sharon Qian, Dimitris Kalimeris, Gal Kaplun, Yaron Singer | Published: 2020-02-21 Robustness EvaluationAdversarial TrainingDefense Method 2020.02.21 2025.05.28 Literature Database
Adversarial Detection and Correction by Matching Prediction Distributions Authors: Giovanni Vacanti, Arnaud Van Looveren | Published: 2020-02-21 Advice ProvisionAdversarial TrainingDefense Method 2020.02.21 2025.05.28 Literature Database
Black-Box Certification with Randomized Smoothing: A Functional Optimization Based Framework Authors: Dinghuai Zhang, Mao Ye, Chengyue Gong, Zhanxing Zhu, Qiang Liu | Published: 2020-02-21 | Updated: 2020-10-20 Robustness EvaluationOptimization ProblemDefense Method 2020.02.21 2025.05.28 Literature Database
Enhanced Adversarial Strategically-Timed Attacks against Deep Reinforcement Learning Authors: Chao-Han Huck Yang, Jun Qi, Pin-Yu Chen, Yi Ouyang, I-Te Danny Hung, Chin-Hui Lee, Xiaoli Ma | Published: 2020-02-20 Reward Mechanism DesignVulnerability PredictionDefense Method 2020.02.20 2025.05.28 Literature Database
Towards Certifiable Adversarial Sample Detection Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2020-02-20 Adversarial ExampleRegularizationDefense Method 2020.02.20 2025.05.28 Literature Database
On Adaptive Attacks to Adversarial Example Defenses Authors: Florian Tramer, Nicholas Carlini, Wieland Brendel, Aleksander Madry | Published: 2020-02-19 | Updated: 2020-10-23 Robustness EvaluationAdversarial ExampleDefense Method 2020.02.19 2025.05.28 Literature Database
Deflecting Adversarial Attacks Authors: Yao Qin, Nicholas Frosst, Colin Raffel, Garrison Cottrell, Geoffrey Hinton | Published: 2020-02-18 PoisoningAdversarial Attack DetectionDefense Method 2020.02.18 2025.05.28 Literature Database