Adversarial Examples in RF Deep Learning: Detection of the Attack and its Physical Robustness Authors: Silvija Kokalj-Filipovic, Rob Miller | Published: 2019-02-16 Adversarial ExampleAdversarial attackAdversarial Attack Methods 2019.02.16 2025.05.28 Literature Database
The Odds are Odd: A Statistical Test for Detecting Adversarial Examples Authors: Kevin Roth, Yannic Kilcher, Thomas Hofmann | Published: 2019-02-13 | Updated: 2019-05-09 Certified RobustnessAdversarial attackAdversarial Attack Methods 2019.02.13 2025.05.28 Literature Database
Model Compression with Adversarial Robustness: A Unified Optimization Framework Authors: Shupeng Gui, Haotao Wang, Chen Yu, Haichuan Yang, Zhangyang Wang, Ji Liu | Published: 2019-02-10 | Updated: 2019-12-28 Adversarial LearningAdversarial attackOptimization Strategy 2019.02.10 2025.05.28 Literature Database
Is Spiking Secure? A Comparative Study on the Security Vulnerabilities of Spiking and Deep Neural Networks Authors: Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique | Published: 2019-02-04 | Updated: 2020-05-18 Adversarial ExampleAdversarial LearningAdversarial attack 2019.02.04 2025.05.28 Literature Database
Robustness of Generalized Learning Vector Quantization Models against Adversarial Attacks Authors: Sascha Saralajew, Lars Holdijk, Maike Rees, Thomas Villmann | Published: 2019-02-01 | Updated: 2019-03-09 Robustness ImprovementAdversarial attackDeep Learning Technology 2019.02.01 2025.05.28 Literature Database
The Efficacy of SHIELD under Different Threat Models Authors: Cory Cornelius, Nilaksh Das, Shang-Tse Chen, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2019-02-01 | Updated: 2019-08-02 Certified RobustnessAdversarial attackThreat modeling 2019.02.01 2025.05.28 Literature Database
Robustness Certificates Against Adversarial Examples for ReLU Networks Authors: Sahil Singla, Soheil Feizi | Published: 2019-02-01 | Updated: 2019-02-05 Robustness ImprovementAdversarial ExampleAdversarial attack 2019.02.01 2025.05.28 Literature Database
Optimal Attack against Autoregressive Models by Manipulating the Environment Authors: Yiding Chen, Xiaojin Zhu | Published: 2019-02-01 | Updated: 2019-12-01 MPC AlgorithmAdversarial attackOptimization Problem 2019.02.01 2025.05.28 Literature Database
A New Family of Neural Networks Provably Resistant to Adversarial Attacks Authors: Rakshit Agrawal, Luca de Alfaro, David Helmbold | Published: 2019-02-01 Adversarial ExampleAdversarial LearningAdversarial attack 2019.02.01 2025.05.28 Literature Database
CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks Authors: Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique | Published: 2019-01-28 | Updated: 2019-05-24 Adversarial ExampleAdversarial Perturbation TechniquesAdversarial attack 2019.01.28 2025.05.28 Literature Database