Optimizing Information Loss Towards Robust Neural Networks Authors: Philip Sperl, Konstantin Böttinger | Published: 2020-08-07 | Updated: 2020-09-29 Information-Theoretic ApproachAdversarial ExampleAdversarial Attack Methods 2020.08.07 2025.05.28 Literature Database
Deep Learning Defenses Against Adversarial Examples for Dynamic Risk Assessment Authors: Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, Ines Goicoechea-Telleria, Raul Orduna-Urrutia | Published: 2020-07-02 Adversarial ExampleAdversarial Attack MethodsDefense Mechanism 2020.07.02 2025.05.28 Literature Database
Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks Authors: Francesco Croce, Maksym Andriushchenko, Naman D. Singh, Nicolas Flammarion, Matthias Hein | Published: 2020-06-23 | Updated: 2022-02-08 Query Generation MethodReinforcement LearningAdversarial Attack Methods 2020.06.23 2025.05.28 Literature Database
RayS: A Ray Searching Method for Hard-label Adversarial Attack Authors: Jinghui Chen, Quanquan Gu | Published: 2020-06-23 | Updated: 2020-09-05 Membership InferenceAdversarial Attack MethodsMachine Learning Algorithm 2020.06.23 2025.05.28 Literature Database
Perceptual Adversarial Robustness: Defense Against Unseen Threat Models Authors: Cassidy Laidlaw, Sahil Singla, Soheil Feizi | Published: 2020-06-22 | Updated: 2021-07-04 PoisoningAdversarial Attack MethodsDefense Mechanism 2020.06.22 2025.05.28 Literature Database
Learning to Generate Noise for Multi-Attack Robustness Authors: Divyam Madaan, Jinwoo Shin, Sung Ju Hwang | Published: 2020-06-22 | Updated: 2021-06-24 Adversarial Perturbation TechniquesAdversarial Attack MethodsDefense Mechanism 2020.06.22 2025.05.28 Literature Database
OGAN: Disrupting Deepfakes with an Adversarial Attack that Survives Training Authors: Eran Segalis, Eran Galili | Published: 2020-06-17 | Updated: 2020-11-25 Adversarial Attack MethodsMachine Learning AlgorithmImage Processing 2020.06.17 2025.05.28 Literature Database
QEBA: Query-Efficient Boundary-Based Blackbox Attack Authors: Huichen Li, Xiaojun Xu, Xiaolu Zhang, Shuang Yang, Bo Li | Published: 2020-05-28 Adversarial Attack MethodsPrivacy Protection in Machine LearningDimensionality Reduction Method 2020.05.28 2025.05.28 Literature Database
Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms Authors: Mohsen Minaei, S Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate | Published: 2020-05-28 Data Protection MethodPrivacy AssessmentAdversarial Attack Methods 2020.05.28 2025.05.28 Literature Database
Transferable Perturbations of Deep Feature Distributions Authors: Nathan Inkawhich, Kevin J Liang, Lawrence Carin, Yiran Chen | Published: 2020-04-27 Multi-Class ClassificationAdversarial Attack MethodsDeep Learning Technology 2020.04.27 2025.05.28 Literature Database