Scaling up the randomized gradient-free adversarial attack reveals overestimation of robustness using established attacks Authors: Francesco Croce, Jonas Rauber, Matthias Hein | Published: 2019-03-27 | Updated: 2019-09-25 Trigger DetectionAdversarial LearningAdversarial Attack Detection 2019.03.27 2025.05.28 Literature Database
A geometry-inspired decision-based attack Authors: Yujia Liu, Seyed-Mohsen Moosavi-Dezfooli, Pascal Frossard | Published: 2019-03-26 Certified RobustnessEffective Perturbation MethodsAdversarial Attack Detection 2019.03.26 2025.05.28 Literature Database
Defending against Whitebox Adversarial Attacks via Randomized Discretization Authors: Yuchen Zhang, Percy Liang | Published: 2019-03-25 Certified RobustnessEffective Perturbation MethodsAdversarial Attack Detection 2019.03.25 2025.05.28 Literature Database
Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness Authors: Jörn-Henrik Jacobsen, Jens Behrmannn, Nicholas Carlini, Florian Tramèr, Nicolas Papernot | Published: 2019-03-25 Certified RobustnessVulnerability of Adversarial ExamplesAdversarial Attack Detection 2019.03.25 2025.05.28 Literature Database
Robust Neural Networks using Randomized Adversarial Training Authors: Alexandre Araujo, Laurent Meunier, Rafael Pinot, Benjamin Negrevergne | Published: 2019-03-25 | Updated: 2020-02-13 Certified RobustnessAdversarial LearningAdversarial Attack Detection 2019.03.25 2025.05.28 Literature Database
Data Poisoning against Differentially-Private Learners: Attacks and Defenses Authors: Yuzhe Ma, Xiaojin Zhu, Justin Hsu | Published: 2019-03-23 | Updated: 2019-07-05 Detection of Poison Data for Backdoor AttacksAdversarial Attack DetectionUntargeted Toxicity Attack 2019.03.23 2025.05.28 Literature Database
Improving Adversarial Robustness via Guided Complement Entropy Authors: Hao-Yun Chen, Jhao-Hong Liang, Shih-Chieh Chang, Jia-Yu Pan, Yu-Ting Chen, Wei Wei, Da-Cheng Juan | Published: 2019-03-23 | Updated: 2019-08-07 Robust OptimizationAdversarial LearningAdversarial Attack Detection 2019.03.23 2025.05.28 Literature Database
On the Robustness of Deep K-Nearest Neighbors Authors: Chawin Sitawarin, David Wagner | Published: 2019-03-20 Certified RobustnessEffective Perturbation MethodsAdversarial Attack Detection 2019.03.20 2025.05.28 Literature Database
Clonability of anti-counterfeiting printable graphical codes: a machine learning approach Authors: Olga Taran, Slavi Bonev, Slava Voloshynovskiy | Published: 2019-03-18 Performance EvaluationAdversarial Attack DetectionDeep Learning Model 2019.03.18 2025.05.28 Literature Database
Generating Adversarial Examples With Conditional Generative Adversarial Net Authors: Ping Yu, Kaitao Song, Jianfeng Lu | Published: 2019-03-18 Certified RobustnessAdversarial ExampleAdversarial Attack Detection 2019.03.18 2025.05.28 Literature Database