Generating Adversarial Inputs Using A Black-box Differential Technique Authors: João Batista Pereira Matos Juúnior, Lucas Carvalho Cordeiro, Marcelo d'Amorim, Xiaowei Huang | Published: 2020-07-10 Performance EvaluationAttack MethodAdversarial Example 2020.07.10 2025.05.28 Literature Database
Improving Adversarial Robustness by Enforcing Local and Global Compactness Authors: Anh Bui, Trung Le, He Zhao, Paul Montague, Olivier deVel, Tamas Abraham, Dinh Phung | Published: 2020-07-10 PoisoningPerformance EvaluationDeep Learning 2020.07.10 2025.05.28 Literature Database
A general framework for defining and optimizing robustness Authors: Alessandro Tibo, Manfred Jaeger, Kim G. Larsen | Published: 2020-06-19 | Updated: 2021-05-29 Safety CharacteristicsPerformance EvaluationAdversarial Learning 2020.06.19 2025.05.28 Literature Database
Local Competition and Uncertainty for Adversarial Robustness in Deep Learning Authors: Antonios Alexos, Konstantinos P. Panousis, Sotirios Chatzis | Published: 2020-06-18 Performance EvaluationAdversarial LearningDeep Learning Method 2020.06.18 2025.05.28 Literature Database
AdvMind: Inferring Adversary Intent of Black-Box Attacks Authors: Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2020-06-16 Performance EvaluationAttack MethodAdversarial Learning 2020.06.16 2025.05.28 Literature Database
On sparse connectivity, adversarial robustness, and a novel model of the artificial neuron Authors: Sergey Bochkanov | Published: 2020-06-16 Algorithm DesignPerformance EvaluationDeep Learning Method 2020.06.16 2025.05.28 Literature Database
SPLASH: Learnable Activation Functions for Improving Accuracy and Adversarial Robustness Authors: Mohammadamin Tavakoli, Forest Agostinelli, Pierre Baldi | Published: 2020-06-16 Performance EvaluationAdversarial ExampleDeep Learning Method 2020.06.16 2025.05.28 Literature Database
Deep-CAPTCHA: a deep learning based CAPTCHA solver for vulnerability assessment Authors: Zahra Noury, Mahdi Rezaei | Published: 2020-06-15 | Updated: 2020-06-24 Performance EvaluationDeep Learning MethodVulnerability detection 2020.06.15 2025.05.28 Literature Database
GS-WGAN: A Gradient-Sanitized Approach for Learning Differentially Private Generators Authors: Dingfan Chen, Tribhuvanesh Orekondy, Mario Fritz | Published: 2020-06-15 | Updated: 2021-03-15 Algorithm DesignPerformance EvaluationPrivacy Protection in Machine Learning 2020.06.15 2025.05.28 Literature Database
Privacy-Preserving Technology to Help Millions of People: Federated Prediction Model for Stroke Prevention Authors: Ce Ju, Ruihui Zhao, Jichao Sun, Xiguang Wei, Bo Zhao, Yang Liu, Hongshan Li, Tianjian Chen, Xinwei Zhang, Dashan Gao, Ben Tan, Han Yu, Chuning He, Yuan Jin | Published: 2020-06-15 | Updated: 2020-12-15 Privacy Design PrinciplesPerformance EvaluationPrivacy Protection in Machine Learning 2020.06.15 2025.05.28 Literature Database