There are No Bit Parts for Sign Bits in Black-Box Attacks Authors: Abdullah Al-Dujaili, Una-May O'Reilly | Published: 2019-02-19 | Updated: 2019-04-03 Certified RobustnessAdversarial Attack MethodsOptimization Strategy 2019.02.19 2025.05.28 Literature Database
On Evaluating Adversarial Robustness Authors: Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian Goodfellow, Aleksander Madry, Alexey Kurakin | Published: 2019-02-18 | Updated: 2019-02-20 Certified RobustnessRobustness Improvement MethodAdversarial Attack Methods 2019.02.18 2025.05.28 Literature Database
The Odds are Odd: A Statistical Test for Detecting Adversarial Examples Authors: Kevin Roth, Yannic Kilcher, Thomas Hofmann | Published: 2019-02-13 | Updated: 2019-05-09 Certified RobustnessAdversarial attackAdversarial Attack Methods 2019.02.13 2025.05.28 Literature Database
Discretization based Solutions for Secure Machine Learning against Adversarial Attacks Authors: Priyadarshini Panda, Indranil Chakraborty, Kaushik Roy | Published: 2019-02-08 | Updated: 2019-02-11 Trigger DetectionCertified RobustnessRobustness Improvement Method 2019.02.08 2025.05.28 Literature Database
Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis Authors: Danilo Vasconcellos Vargas, Jiawei Su | Published: 2019-02-08 Certified RobustnessAdversarial Attack MethodsImage Classification Interpretation 2019.02.08 2025.05.28 Literature Database
The Efficacy of SHIELD under Different Threat Models Authors: Cory Cornelius, Nilaksh Das, Shang-Tse Chen, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2019-02-01 | Updated: 2019-08-02 Certified RobustnessAdversarial attackThreat modeling 2019.02.01 2025.05.28 Literature Database
Natural and Adversarial Error Detection using Invariance to Image Transformations Authors: Yuval Bahat, Michal Irani, Gregory Shakhnarovich | Published: 2019-02-01 Data CurationCertified RobustnessRobustness Improvement 2019.02.01 2025.05.28 Literature Database
Improving Adversarial Robustness via Promoting Ensemble Diversity Authors: Tianyu Pang, Kun Xu, Chao Du, Ning Chen, Jun Zhu | Published: 2019-01-25 | Updated: 2019-05-29 Certified RobustnessAdversarial LearningDeep Learning Method 2019.01.25 2025.05.28 Literature Database
Sitatapatra: Blocking the Transfer of Adversarial Samples Authors: Ilia Shumailov, Xitong Gao, Yiren Zhao, Robert Mullins, Ross Anderson, Cheng-Zhong Xu | Published: 2019-01-23 | Updated: 2019-11-21 Certified RobustnessAdversarial ExampleNon-Transferable Detection 2019.01.23 2025.05.28 Literature Database
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples Authors: Qiang Zeng, Jianhai Su, Chenglong Fu, Golam Kayas, Lannan Luo | Published: 2018-12-26 | Updated: 2019-12-03 Certified RobustnessAdversarial Example DetectionSpeech Recognition Process 2018.12.26 2025.05.28 Literature Database