How many dimensions are required to find an adversarial example? Authors: Charles Godfrey, Henry Kvinge, Elise Bishoff, Myles Mckay, Davis Brown, Tim Doster, Eleanor Byler | Published: 2023-03-24 | Updated: 2023-04-11 Convergence PropertyAdversarial ExampleMachine Learning Technology 2023.03.24 2025.05.28 Literature Database
Certified Robust Neural Networks: Generalization and Corruption Resistance Authors: Amine Bennouna, Ryan Lucas, Bart Van Parys | Published: 2023-03-03 | Updated: 2023-05-18 Poisoning AttackLoss FunctionAdversarial Example 2023.03.03 2025.05.28 Literature Database
Generalization Bounds for Adversarial Contrastive Learning Authors: Xin Zou, Weiwei Liu | Published: 2023-02-21 WatermarkingModel Performance EvaluationAdversarial Example 2023.02.21 2025.05.28 Literature Database
On the Discredibility of Membership Inference Attacks Authors: Shahbaz Rezaei, Xin Liu | Published: 2022-12-06 | Updated: 2023-04-28 Subpopulation CharacteristicsMembership Disclosure RiskAdversarial Example 2022.12.06 2025.05.28 Literature Database
Hijack Vertical Federated Learning Models As One Party Authors: Pengyu Qiu, Xuhong Zhang, Shouling Ji, Changjiang Li, Yuwen Pu, Xing Yang, Ting Wang | Published: 2022-12-01 | Updated: 2024-02-16 Adversarial ExampleOptimization ProblemUntargeted Toxicity Attack 2022.12.01 2025.05.28 Literature Database
Evolution of Neural Tangent Kernels under Benign and Adversarial Training Authors: Noel Loo, Ramin Hasani, Alexander Amini, Daniela Rus | Published: 2022-10-21 Adversarial ExampleAdversarial Attack MethodsDeep Learning Method 2022.10.21 2025.05.28 Literature Database
Scaling Adversarial Training to Large Perturbation Bounds Authors: Sravanti Addepalli, Samyak Jain, Gaurang Sriramanan, R. Venkatesh Babu | Published: 2022-10-18 Adversarial ExampleAdversarial Attack MethodsDeep Learning Method 2022.10.18 2025.05.28 Literature Database
Towards Generating Adversarial Examples on Mixed-type Data Authors: Han Xu, Menghai Pan, Zhimeng Jiang, Huiyuan Chen, Xiaoting Li, Mahashweta Das, Hao Yang | Published: 2022-10-17 Adversarial ExampleAdversarial Attack MethodsSelection and Evaluation of Optimization Algorithms 2022.10.17 2025.05.28 Literature Database
Preprocessors Matter! Realistic Decision-Based Attacks on Machine Learning Systems Authors: Chawin Sitawarin, Florian Tramèr, Nicholas Carlini | Published: 2022-10-07 | Updated: 2023-07-20 DNN IP Protection MethodModel Extraction AttackAdversarial Example 2022.10.07 2025.05.28 Literature Database
A Black-Box Attack on Optical Character Recognition Systems Authors: Samet Bayram, Kenneth Barner | Published: 2022-08-30 Adversarial ExampleAdversarial attackOptimization Methods 2022.08.30 2025.05.28 Literature Database