Certified Robustness

There are No Bit Parts for Sign Bits in Black-Box Attacks

Authors: Abdullah Al-Dujaili, Una-May O'Reilly | Published: 2019-02-19 | Updated: 2019-04-03
Certified Robustness
Adversarial Attack Methods
Optimization Strategy

On Evaluating Adversarial Robustness

Authors: Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian Goodfellow, Aleksander Madry, Alexey Kurakin | Published: 2019-02-18 | Updated: 2019-02-20
Certified Robustness
Robustness Improvement Method
Adversarial Attack Methods

The Odds are Odd: A Statistical Test for Detecting Adversarial Examples

Authors: Kevin Roth, Yannic Kilcher, Thomas Hofmann | Published: 2019-02-13 | Updated: 2019-05-09
Certified Robustness
Adversarial attack
Adversarial Attack Methods

Discretization based Solutions for Secure Machine Learning against Adversarial Attacks

Authors: Priyadarshini Panda, Indranil Chakraborty, Kaushik Roy | Published: 2019-02-08 | Updated: 2019-02-11
Trigger Detection
Certified Robustness
Robustness Improvement Method

Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis

Authors: Danilo Vasconcellos Vargas, Jiawei Su | Published: 2019-02-08
Certified Robustness
Adversarial Attack Methods
Image Classification Interpretation

The Efficacy of SHIELD under Different Threat Models

Authors: Cory Cornelius, Nilaksh Das, Shang-Tse Chen, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2019-02-01 | Updated: 2019-08-02
Certified Robustness
Adversarial attack
Threat modeling

Natural and Adversarial Error Detection using Invariance to Image Transformations

Authors: Yuval Bahat, Michal Irani, Gregory Shakhnarovich | Published: 2019-02-01
Data Curation
Certified Robustness
Robustness Improvement

Improving Adversarial Robustness via Promoting Ensemble Diversity

Authors: Tianyu Pang, Kun Xu, Chao Du, Ning Chen, Jun Zhu | Published: 2019-01-25 | Updated: 2019-05-29
Certified Robustness
Adversarial Learning
Deep Learning Method

Sitatapatra: Blocking the Transfer of Adversarial Samples

Authors: Ilia Shumailov, Xitong Gao, Yiren Zhao, Robert Mullins, Ross Anderson, Cheng-Zhong Xu | Published: 2019-01-23 | Updated: 2019-11-21
Certified Robustness
Adversarial Example
Non-Transferable Detection

A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples

Authors: Qiang Zeng, Jianhai Su, Chenglong Fu, Golam Kayas, Lannan Luo | Published: 2018-12-26 | Updated: 2019-12-03
Certified Robustness
Adversarial Example Detection
Speech Recognition Process