PAC-learning in the presence of evasion adversaries Authors: Daniel Cullina, Arjun Nitin Bhagoji, Prateek Mittal | Published: 2018-06-05 | Updated: 2018-06-06 Certified RobustnessLoss FunctionAdversarial Transferability 2018.06.05 2025.05.13 Literature Database
Sufficient Conditions for Idealised Models to Have No Adversarial Examples: a Theoretical and Empirical Study with Bayesian Neural Networks Authors: Yarin Gal, Lewis Smith | Published: 2018-06-02 | Updated: 2018-06-28 Label UncertaintyAdversarial ExampleAdversarial Transferability 2018.06.02 2025.05.13 Literature Database
Detecting Adversarial Examples via Key-based Network Authors: Pinlong Zhao, Zhouyu Fu, Ou wu, Qinghua Hu, Jun Wang | Published: 2018-06-02 Adversarial LearningAdversarial TransferabilityWatermark Evaluation 2018.06.02 2025.05.13 Literature Database
Sequential Attacks on Agents for Long-Term Adversarial Goals Authors: Edgar Tretschk, Seong Joon Oh, Mario Fritz | Published: 2018-05-31 | Updated: 2018-07-05 Certified RobustnessReinforcement LearningAdversarial Transferability 2018.05.31 2025.05.13 Literature Database
Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data Authors: Puyudi Yang, Jianbo Chen, Cho-Jui Hsieh, Jane-Ling Wang, Michael I. Jordan | Published: 2018-05-31 Adversarial TransferabilityFeature Importance AnalysisWatermark Evaluation 2018.05.31 2025.05.13 Literature Database
ADAGIO: Interactive Experimentation with Adversarial Attack and Defense for Audio Authors: Nilaksh Das, Madhuri Shanbhogue, Shang-Tse Chen, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2018-05-30 Adversarial TransferabilityWatermark Evaluation 2018.05.30 2025.05.13 Literature Database