Absum: Simple Regularization Method for Reducing Structural Sensitivity of Convolutional Neural Networks Authors: Sekitoshi Kanai, Yasutoshi Ida, Yasuhiro Fujiwara, Masanori Yamada, Shuichi Adachi | Published: 2019-09-19 Experimental ValidationAdversarial ExampleAdversarial attack 2019.09.19 2025.05.28 Literature Database
Adversarial Attacks and Defenses in Images, Graphs and Text: A Review Authors: Han Xu, Yao Ma, Haochen Liu, Debayan Deb, Hui Liu, Jiliang Tang, Anil K. Jain | Published: 2019-09-17 | Updated: 2019-10-09 PoisoningAdversarial ExampleAdversarial attack 2019.09.17 2025.05.28 Literature Database
Exploring the Robustness of NMT Systems to Nonsensical Inputs Authors: Akshay Chaturvedi, Abijith KP, Utpal Garain | Published: 2019-08-03 | Updated: 2020-02-28 BLEU Score EvaluationAdversarial attackMachine Learning 2019.08.03 2025.05.28 Literature Database
Graph Interpolating Activation Improves Both Natural and Robust Accuracies in Data-Efficient Deep Learning Authors: Bao Wang, Stanley J. Osher | Published: 2019-07-16 Adversarial attackDeep Learning MethodWeight Update Method 2019.07.16 2025.05.28 Literature Database
Recovery Guarantees for Compressible Signals with Adversarial Noise Authors: Jasjeet Dhaliwal, Kyle Hambrook | Published: 2019-07-15 | Updated: 2019-08-07 Algorithm DesignAdversarial attackDeep Learning Method 2019.07.15 2025.05.28 Literature Database
Measuring the Transferability of Adversarial Examples Authors: Deyan Petrov, Timothy M. Hospedales | Published: 2019-07-14 Adversarial ExampleAdversarial attackDeep Learning Method 2019.07.14 2025.05.28 Literature Database
Stateful Detection of Black-Box Adversarial Attacks Authors: Steven Chen, Nicholas Carlini, David Wagner | Published: 2019-07-12 PoisoningAttack DetectionAdversarial attack 2019.07.12 2025.05.28 Literature Database
Adversarial Objects Against LiDAR-Based Autonomous Driving Systems Authors: Yulong Cao, Chaowei Xiao, Dawei Yang, Jing Fang, Ruigang Yang, Mingyan Liu, Bo Li | Published: 2019-07-11 Adversarial ExampleAdversarial attackDeep Learning Method 2019.07.11 2025.05.28 Literature Database
Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn Authors: Ziv Katzir, Yuval Elovici | Published: 2019-07-11 Adversarial ExampleAdversarial attackDeep Learning Method 2019.07.11 2025.05.28 Literature Database
Detecting and Diagnosing Adversarial Images with Class-Conditional Capsule Reconstructions Authors: Yao Qin, Nicholas Frosst, Sara Sabour, Colin Raffel, Garrison Cottrell, Geoffrey Hinton | Published: 2019-07-05 | Updated: 2020-02-18 Adversarial ExampleAdversarial attackDeep Learning Method 2019.07.05 2025.05.28 Literature Database