Certified Robustness

Security Matters: A Survey on Adversarial Machine Learning

Authors: Guofu Li, Pengjia Zhu, Jin Li, Zhemin Yang, Ning Cao, Zhiyi Chen | Published: 2018-10-16 | Updated: 2018-10-23
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

The Adversarial Attack and Detection under the Fisher Information Metric

Authors: Chenxiao Zhao, P. Thomas Fletcher, Mixue Yu, Yaxin Peng, Guixu Zhang, Chaomin Shen | Published: 2018-10-09 | Updated: 2019-02-09
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network

Authors: Xuanqing Liu, Yao Li, Chongruo Wu, Cho-Jui Hsieh | Published: 2018-10-01 | Updated: 2019-05-04
Certified Robustness
Robustness Improvement Method
Adversarial Learning

Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks

Authors: Kenneth T. Co, Luis Muñoz-González, Sixte de Maupeou, Emil C. Lupu | Published: 2018-09-30 | Updated: 2019-11-23
Certified Robustness
Robustness Improvement Method
Adversarial Attack Methods

Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward

Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2018-09-26
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

Neural Networks with Structural Resistance to Adversarial Attacks

Authors: Luca de Alfaro | Published: 2018-09-25
Poisoning
Certified Robustness
Robustness Improvement Method

Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization

Authors: Bao Wang, Alex T. Lin, Wei Zhu, Penghang Yin, Andrea L. Bertozzi, Stanley J. Osher | Published: 2018-09-23 | Updated: 2020-04-29
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks

Authors: Siyue Wang, Xiao Wang, Pu Zhao, Wujie Wen, David Kaeli, Peter Chin, Xue Lin | Published: 2018-09-13
Certified Robustness
Robustness Improvement
Adversarial Example

Query-Efficient Black-Box Attack by Active Learning

Authors: Pengcheng Li, Jinfeng Yi, Lijun Zhang | Published: 2018-09-13
Query Generation Method
Certified Robustness
Adversarial attack

Adversarial Examples: Opportunities and Challenges

Authors: Jiliang Zhang, Chen Li | Published: 2018-09-13 | Updated: 2019-09-23
Certified Robustness
Adversarial Example
Defense Method