Logit Pairing Methods Can Fool Gradient-Based Attacks Authors: Marius Mosbach, Maksym Andriushchenko, Thomas Trost, Matthias Hein, Dietrich Klakow | Published: 2018-10-29 | Updated: 2019-03-12 robustness requirementsAdversarial LearningAdversarial Training 2018.10.29 2025.05.28 Literature Database
RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications Authors: Huan Zhang, Pengchuan Zhang, Cho-Jui Hsieh | Published: 2018-10-28 | Updated: 2019-02-27 Trigger DetectionMathematical AnalysisAdversarial Learning 2018.10.28 2025.05.28 Literature Database
Evading classifiers in discrete domains with provable optimality guarantees Authors: Bogdan Kulynych, Jamie Hayes, Nikita Samarin, Carmela Troncoso | Published: 2018-10-25 | Updated: 2019-07-01 Certified RobustnessPerformance EvaluationAdversarial Learning 2018.10.25 2025.05.28 Literature Database
ReDMark: Framework for Residual Diffusion Watermarking on Deep Networks Authors: Mahdi Ahmadi, Alireza Norouzi, S. M. Reza Soroushmehr, Nader Karimi, Kayvan Najarian, Shadrokh Samavi, Ali Emami | Published: 2018-10-16 | Updated: 2018-12-11 Robustness Improvement MethodPerformance Evaluation MetricsAdversarial Learning 2018.10.16 2025.05.28 Literature Database
Security Matters: A Survey on Adversarial Machine Learning Authors: Guofu Li, Pengjia Zhu, Jin Li, Zhemin Yang, Ning Cao, Zhiyi Chen | Published: 2018-10-16 | Updated: 2018-10-23 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2018.10.16 2025.05.28 Literature Database
The Adversarial Attack and Detection under the Fisher Information Metric Authors: Chenxiao Zhao, P. Thomas Fletcher, Mixue Yu, Yaxin Peng, Guixu Zhang, Chaomin Shen | Published: 2018-10-09 | Updated: 2019-02-09 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2018.10.09 2025.05.28 Literature Database
Improving the Generalization of Adversarial Training with Domain Adaptation Authors: Chuanbiao Song, Kun He, Liwei Wang, John E. Hopcroft | Published: 2018-10-01 | Updated: 2019-03-15 Robustness Improvement MethodAdversarial LearningAdversarial Attack Methods 2018.10.01 2025.05.28 Literature Database
Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network Authors: Xuanqing Liu, Yao Li, Chongruo Wu, Cho-Jui Hsieh | Published: 2018-10-01 | Updated: 2019-05-04 Certified RobustnessRobustness Improvement MethodAdversarial Learning 2018.10.01 2025.05.28 Literature Database
Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2018-09-26 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2018.09.26 2025.05.28 Literature Database
Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization Authors: Bao Wang, Alex T. Lin, Wei Zhu, Penghang Yin, Andrea L. Bertozzi, Stanley J. Osher | Published: 2018-09-23 | Updated: 2020-04-29 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2018.09.23 2025.05.28 Literature Database