Adversarial Regression with Multiple Learners Authors: Liang Tong, Sixie Yu, Scott Alfeld, Yevgeniy Vorobeychik | Published: 2018-06-06 PoisoningLoss FunctionAdversarial Learning 2018.06.06 2025.05.28 Literature Database
Detecting Adversarial Examples via Key-based Network Authors: Pinlong Zhao, Zhouyu Fu, Ou wu, Qinghua Hu, Jun Wang | Published: 2018-06-02 Adversarial LearningAdversarial TransferabilityWatermark Evaluation 2018.06.02 2025.05.28 Literature Database
Towards Robust Training of Neural Networks by Regularizing Adversarial Gradients Authors: Fuxun Yu, Zirui Xu, Yanzhi Wang, Chenchen Liu, Xiang Chen | Published: 2018-05-23 | Updated: 2018-06-07 Model RobustnessAdversarial LearningAdversarial Attack Detection 2018.05.23 2025.05.28 Literature Database
Constructing Unrestricted Adversarial Examples with Generative Models Authors: Yang Song, Rui Shu, Nate Kushman, Stefano Ermon | Published: 2018-05-21 | Updated: 2018-12-02 Adversarial LearningAdversarial Attack DetectionGenerative Model 2018.05.21 2025.05.28 Literature Database
Curriculum Adversarial Training Authors: Qi-Zhi Cai, Min Du, Chang Liu, Dawn Song | Published: 2018-05-13 Data CurationModel RobustnessAdversarial Learning 2018.05.13 2025.05.28 Literature Database
Gradient Masking Causes CLEVER to Overestimate Adversarial Perturbation Size Authors: Ian Goodfellow | Published: 2018-04-21 Adversarial LearningAdversarial Attack MethodsWatermarking Technology 2018.04.21 2025.05.28 Literature Database
Learning More Robust Features with Adversarial Training Authors: Shuangtao Li, Yuanke Chen, Yanlin Peng, Lin Bai | Published: 2018-04-20 Adversarial LearningAdversarial LearningWatermarking Technology 2018.04.20 2025.05.28 Literature Database
Adversarial Attacks Against Medical Deep Learning Systems Authors: Samuel G. Finlayson, Hyung Won Chung, Isaac S. Kohane, Andrew L. Beam | Published: 2018-04-15 | Updated: 2019-02-04 Adversarial LearningAdversarial Attack AnalysisDeep Learning 2018.04.15 2025.05.28 Literature Database
Adversarial Training Versus Weight Decay Authors: Angus Galloway, Thomas Tanay, Graham W. Taylor | Published: 2018-04-10 | Updated: 2018-07-23 Certified RobustnessAdversarial LearningAdversarial attack 2018.04.10 2025.05.28 Literature Database
Bypassing Feature Squeezing by Increasing Adversary Strength Authors: Yash Sharma, Pin-Yu Chen | Published: 2018-03-27 Experimental ValidationAdversarial LearningAdversarial attack 2018.03.27 2025.05.28 Literature Database