A Dynamic-Adversarial Mining Approach to the Security of Machine Learning Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Lingyu Lyua, Jiashun Chen | Published: 2018-03-24 Model Extraction AttackDetection of Model Extraction AttacksAdversarial Learning 2018.03.24 2025.05.28 Literature Database
Improving DNN Robustness to Adversarial Attacks using Jacobian Regularization Authors: Daniel Jakubovitz, Raja Giryes | Published: 2018-03-23 | Updated: 2019-05-28 Certified RobustnessAdversarial LearningRegularization 2018.03.23 2025.05.28 Literature Database
Adversarial Defense based on Structure-to-Signal Autoencoders Authors: Joachim Folz, Sebastian Palacio, Joern Hees, Damian Borth, Andreas Dengel | Published: 2018-03-21 PoisoningAdversarial LearningImage Feature Extraction 2018.03.21 2025.05.28 Literature Database
Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks Authors: Octavian Suciu, Radu Mărginean, Yiğitcan Kaya, Hal Daumé III, Tudor Dumitraş | Published: 2018-03-19 | Updated: 2019-03-08 Performance Evaluation MetricsAdversarial ExampleAdversarial Learning 2018.03.19 2025.05.28 Literature Database
Adversarial Logit Pairing Authors: Harini Kannan, Alexey Kurakin, Ian Goodfellow | Published: 2018-03-16 Certified RobustnessAdversarial LearningMachine Learning Method 2018.03.16 2025.05.28 Literature Database
Vulnerability of Deep Learning Authors: Richard Kenway | Published: 2018-03-16 Convergence PropertyAdversarial ExampleAdversarial Learning 2018.03.16 2025.05.28 Literature Database
Variance Networks: When Expectation Does Not Meet Your Expectations Authors: Kirill Neklyudov, Dmitry Molchanov, Arsenii Ashukha, Dmitry Vetrov | Published: 2018-03-10 | Updated: 2019-02-18 Bayesian SecurityAdversarial LearningMachine Learning Application 2018.03.10 2025.05.28 Literature Database
Stochastic Activation Pruning for Robust Adversarial Defense Authors: Guneet S. Dhillon, Kamyar Azizzadenesheli, Zachary C. Lipton, Jeremy Bernstein, Jean Kossaifi, Aran Khanna, Anima Anandkumar | Published: 2018-03-05 Adversarial Example DetectionAdversarial LearningMachine Learning Technology 2018.03.05 2025.05.28 Literature Database
Understanding and Enhancing the Transferability of Adversarial Examples Authors: Lei Wu, Zhanxing Zhu, Cheng Tai, Weinan E | Published: 2018-02-27 Model evaluation methodsAdversarial LearningAdversarial Attack Analysis 2018.02.27 2025.05.28 Literature Database
Adversarial Training for Probabilistic Spiking Neural Networks Authors: Alireza Bagheri, Osvaldo Simeone, Bipin Rajendran | Published: 2018-02-22 | Updated: 2018-02-26 Spiking Neural NetworkAdversarial LearningAdversarial Training 2018.02.22 2025.05.28 Literature Database