Attacking Vision-based Perception in End-to-End Autonomous Driving Models Authors: Adith Boloor, Karthik Garimella, Xin He, Christopher Gill, Yevgeniy Vorobeychik, Xuan Zhang | Published: 2019-10-02 Attack EvaluationAdversarial Attack MethodsVehicle Hijacking Attack 2019.10.02 2025.05.28 Literature Database
Analyzing and Improving Neural Networks by Generating Semantic Counterexamples through Differentiable Rendering Authors: Lakshya Jain, Varun Chandrasekaran, Uyeong Jang, Wilson Wu, Andrew Lee, Andy Yan, Steven Chen, Somesh Jha, Sanjit A. Seshia | Published: 2019-10-02 | Updated: 2020-07-17 Semantic Information ExtractionAttack EvaluationAdversarial Attack Methods 2019.10.02 2025.05.28 Literature Database
An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack Authors: Yang Zhang, Shiyu Chang, Mo Yu, Kaizhi Qian | Published: 2019-10-01 Backdoor AttackModel Design and AccuracyAdversarial Attack Methods 2019.10.01 2025.05.28 Literature Database
Black-box Adversarial Attacks with Bayesian Optimization Authors: Satya Narayan Shukla, Anit Kumar Sahu, Devin Willmott, J. Zico Kolter | Published: 2019-09-30 Bayesian OptimizationModel Design and AccuracyAdversarial Attack Methods 2019.09.30 2025.05.28 Literature Database
Testing Robustness Against Unforeseen Adversaries Authors: Max Kaufmann, Daniel Kang, Yi Sun, Steven Basart, Xuwang Yin, Mantas Mazeika, Akul Arora, Adam Dziedzic, Franziska Boenisch, Tom Brown, Jacob Steinhardt, Dan Hendrycks | Published: 2019-08-21 | Updated: 2023-10-30 Robustness Improvement MethodFuture ResearchAdversarial Attack Methods 2019.08.21 2025.05.28 Literature Database
Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks Authors: Ka-Ho Chow, Wenqi Wei, Yanzhao Wu, Ling Liu | Published: 2019-08-21 | Updated: 2019-10-26 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2019.08.21 2025.05.28 Literature Database
Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses Authors: Xiao Wang, Siyue Wang, Pin-Yu Chen, Yanzhi Wang, Brian Kulis, Xue Lin, Peter Chin | Published: 2019-08-20 PoisoningRobustness Improvement MethodAdversarial Attack Methods 2019.08.20 2025.05.28 Literature Database
Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks Authors: Jiadong Lin, Chuanbiao Song, Kun He, Liwei Wang, John E. Hopcroft | Published: 2019-08-17 | Updated: 2020-02-03 Robustness Improvement MethodAttack EvaluationAdversarial Attack Methods 2019.08.17 2025.05.28 Literature Database
On the Adversarial Robustness of Subspace Learning Authors: Fuwei Li, Lifeng Lai, Shuguang Cui | Published: 2019-08-17 Definition of Mathematical ConceptsAdversarial Attack MethodsOptimization Problem 2019.08.17 2025.05.28 Literature Database
Adversarial shape perturbations on 3D point clouds Authors: Daniel Liu, Ronald Yu, Hao Su | Published: 2019-08-16 | Updated: 2020-10-23 Robustness Improvement MethodAttack EvaluationAdversarial Attack Methods 2019.08.16 2025.05.28 Literature Database