Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis Authors: Danilo Vasconcellos Vargas, Jiawei Su | Published: 2019-02-08 Certified RobustnessAdversarial Attack MethodsImage Classification Interpretation 2019.02.08 2025.05.28 Literature Database
The Efficacy of SHIELD under Different Threat Models Authors: Cory Cornelius, Nilaksh Das, Shang-Tse Chen, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2019-02-01 | Updated: 2019-08-02 Certified RobustnessAdversarial attackThreat modeling 2019.02.01 2025.05.28 Literature Database
Natural and Adversarial Error Detection using Invariance to Image Transformations Authors: Yuval Bahat, Michal Irani, Gregory Shakhnarovich | Published: 2019-02-01 Data CurationCertified RobustnessRobustness Improvement 2019.02.01 2025.05.28 Literature Database
Improving Adversarial Robustness via Promoting Ensemble Diversity Authors: Tianyu Pang, Kun Xu, Chao Du, Ning Chen, Jun Zhu | Published: 2019-01-25 | Updated: 2019-05-29 Certified RobustnessAdversarial LearningDeep Learning Method 2019.01.25 2025.05.28 Literature Database
Sitatapatra: Blocking the Transfer of Adversarial Samples Authors: Ilia Shumailov, Xitong Gao, Yiren Zhao, Robert Mullins, Ross Anderson, Cheng-Zhong Xu | Published: 2019-01-23 | Updated: 2019-11-21 Certified RobustnessAdversarial ExampleNon-Transferable Detection 2019.01.23 2025.05.28 Literature Database
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples Authors: Qiang Zeng, Jianhai Su, Chenglong Fu, Golam Kayas, Lannan Luo | Published: 2018-12-26 | Updated: 2019-12-03 Certified RobustnessAdversarial Example DetectionSpeech Recognition Process 2018.12.26 2025.05.28 Literature Database
Guessing Smart: Biased Sampling for Efficient Black-Box Adversarial Attacks Authors: Thomas Brunner, Frederik Diehl, Michael Truong Le, Alois Knoll | Published: 2018-12-24 | Updated: 2019-05-05 Certified RobustnessRobustnessAdversarial Example Detection 2018.12.24 2025.05.28 Literature Database
Designing Adversarially Resilient Classifiers using Resilient Feature Engineering Authors: Kevin Eykholt, Atul Prakash | Published: 2018-12-17 Multi-Class ClassificationCertified RobustnessRobustness 2018.12.17 2025.05.28 Literature Database
Trust Region Based Adversarial Attack on Neural Networks Authors: Zhewei Yao, Amir Gholami, Peng Xu, Kurt Keutzer, Michael Mahoney | Published: 2018-12-16 Certified RobustnessRobustnessAdversarial Learning 2018.12.16 2025.05.28 Literature Database
Perturbation Analysis of Learning Algorithms: A Unifying Perspective on Generation of Adversarial Examples Authors: Emilio Rafael Balda, Arash Behboodi, Rudolf Mathar | Published: 2018-12-15 Certified RobustnessRobust OptimizationAdversarial Example Detection 2018.12.15 2025.05.28 Literature Database