Certified Robustness

Adversarial Vision Challenge

Authors: Wieland Brendel, Jonas Rauber, Alexey Kurakin, Nicolas Papernot, Behar Veliqi, Marcel Salathé, Sharada P. Mohanty, Matthias Bethge | Published: 2018-08-06 | Updated: 2018-12-06
Certified Robustness
Adversarial Learning
Adversarial attack

Structured Adversarial Attack: Towards General Implementation and Better Interpretability

Authors: Kaidi Xu, Sijia Liu, Pu Zhao, Pin-Yu Chen, Huan Zhang, Quanfu Fan, Deniz Erdogmus, Yanzhi Wang, Xue Lin | Published: 2018-08-05 | Updated: 2019-02-19
Certified Robustness
Adversarial attack
Interpretation Method

ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples

Authors: Xinbo Liu, Jiliang Zhang, Yaping Lin, He Li | Published: 2018-08-05 | Updated: 2019-12-30
Certified Robustness
Model Extraction Attack
Adversarial attack

DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes

Authors: Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar | Published: 2018-08-03 | Updated: 2020-04-23
Certified Robustness
Adversarial Example
Adversarial attack

Simultaneous Adversarial Training – Learn from Others Mistakes

Authors: Zukang Liao | Published: 2018-07-21 | Updated: 2018-09-10
Certified Robustness
Robustness Evaluation
Adversarial attack

Motivating the Rules of the Game for Adversarial Example Research

Authors: Justin Gilmer, Ryan P. Adams, Ian Goodfellow, David Andersen, George E. Dahl | Published: 2018-07-18 | Updated: 2018-07-20
Certified Robustness
Adversarial Example
Adversarial attack

Implicit Generative Modeling of Random Noise during Training for Adversarial Robustness

Authors: Priyadarshini Panda, Kaushik Roy | Published: 2018-07-05 | Updated: 2019-05-31
Data Generation
Certified Robustness
Adversarial Learning

Adversarial Reprogramming of Neural Networks

Authors: Gamaleldin F. Elsayed, Ian Goodfellow, Jascha Sohl-Dickstein | Published: 2018-06-28 | Updated: 2018-11-29
Certified Robustness
Adversarial Example
Watermark

Adversarial Distillation of Bayesian Neural Network Posteriors

Authors: Kuan-Chieh Wang, Paul Vicol, James Lucas, Li Gu, Roger Grosse, Richard Zemel | Published: 2018-06-27
Certified Robustness
Adversarial Example
Deep Learning Technology

Built-in Vulnerabilities to Imperceptible Adversarial Perturbations

Authors: Thomas Tanay, Jerone T. A. Andrews, Lewis D. Griffin | Published: 2018-06-19 | Updated: 2019-05-07
Certified Robustness
Adversarial Learning
Adversarial Training