ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah | Published: 2019-04-17 Adversarial ExampleAdversarial LearningMachine Learning Method 2019.04.17 2025.05.28 Literature Database
Defensive Quantization: When Efficiency Meets Robustness Authors: Ji Lin, Chuang Gan, Song Han | Published: 2019-04-17 Adversarial LearningAdversarial Attack DetectionQuantized Neural Network 2019.04.17 2025.05.28 Literature Database
Are Self-Driving Cars Secure? Evasion Attacks against Deep Neural Networks for Steering Angle Prediction Authors: Alesia Chernikova, Alina Oprea, Cristina Nita-Rotaru, BaekGyu Kim | Published: 2019-04-15 Adversarial LearningAdversarial Attack DetectionDeep Learning 2019.04.15 2025.05.28 Literature Database
On the Vulnerability of CNN Classifiers in EEG-Based BCIs Authors: Xiao Zhang, Dongrui Wu | Published: 2019-03-31 Certified RobustnessAdversarial LearningAdversarial Attack Detection 2019.03.31 2025.05.28 Literature Database
Benchmarking Neural Network Robustness to Common Corruptions and Perturbations Authors: Dan Hendrycks, Thomas Dietterich | Published: 2019-03-28 Robust OptimizationAdversarial LearningAdversarial Attack Detection 2019.03.28 2025.05.28 Literature Database
Rallying Adversarial Techniques against Deep Learning for Network Security Authors: Joseph Clements, Yuzhe Yang, Ankur Sharma, Hongxin Hu, Yingjie Lao | Published: 2019-03-27 | Updated: 2021-10-25 Effective Perturbation MethodsAdversarial LearningAdversarial Attack Detection 2019.03.27 2025.05.28 Literature Database
Bridging Adversarial Robustness and Gradient Interpretability Authors: Beomsu Kim, Junghoon Seo, Taegyun Jeon | Published: 2019-03-27 | Updated: 2019-04-19 Certified RobustnessAdversarial LearningInterpretability 2019.03.27 2025.05.28 Literature Database
Scaling up the randomized gradient-free adversarial attack reveals overestimation of robustness using established attacks Authors: Francesco Croce, Jonas Rauber, Matthias Hein | Published: 2019-03-27 | Updated: 2019-09-25 Trigger DetectionAdversarial LearningAdversarial Attack Detection 2019.03.27 2025.05.28 Literature Database
The LogBarrier adversarial attack: making effective use of decision boundary information Authors: Chris Finlay, Aram-Alexandre Pooladian, Adam M. Oberman | Published: 2019-03-25 Certified RobustnessEffective Perturbation MethodsAdversarial Learning 2019.03.25 2025.05.28 Literature Database
Robust Neural Networks using Randomized Adversarial Training Authors: Alexandre Araujo, Laurent Meunier, Rafael Pinot, Benjamin Negrevergne | Published: 2019-03-25 | Updated: 2020-02-13 Certified RobustnessAdversarial LearningAdversarial Attack Detection 2019.03.25 2025.05.28 Literature Database