Image classification and retrieval with random depthwise signed convolutional neural networks Authors: Yunzhe Xue, Usman Roshan | Published: 2018-06-15 | Updated: 2019-03-15 Deep Learning TechnologyImage Classification Method 2018.06.15 2025.05.28 Literature Database
Hardware Trojan Attacks on Neural Networks Authors: Joseph Clements, Yingjie Lao | Published: 2018-06-14 Trigger DetectionAdversarial ExampleDeep Learning Technology 2018.06.14 2025.05.28 Literature Database
Manifold Mixup: Better Representations by Interpolating Hidden States Authors: Vikas Verma, Alex Lamb, Christopher Beckham, Amir Najafi, Ioannis Mitliagkas, Aaron Courville, David Lopez-Paz, Yoshua Bengio | Published: 2018-06-13 | Updated: 2019-05-11 Class SelectivityRobustness Improvement MethodDeep Learning Technology 2018.06.13 2025.05.28 Literature Database
TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service Authors: Amartya Sanyal, Matt J. Kusner, Adrià Gascón, Varun Kanade | Published: 2018-06-09 Certified RobustnessEncrypted Traffic DetectionDeep Learning Technology 2018.06.09 2025.05.28 Literature Database
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware Authors: Florian Tramèr, Dan Boneh | Published: 2018-06-08 | Updated: 2019-02-27 Privacy Protection MethodFormal VerificationDeep Learning Technology 2018.06.08 2025.05.28 Literature Database
Evaluating Robustness of Neural Networks with Mixed Integer Programming Authors: Vincent Tjeng, Kai Xiao, Russ Tedrake | Published: 2017-11-20 | Updated: 2019-02-18 Certified RobustnessRobustnessDeep Learning Technology 2017.11.20 2025.05.28 Literature Database
Provable defenses against adversarial examples via the convex outer adversarial polytope Authors: Eric Wong, J. Zico Kolter | Published: 2017-11-02 | Updated: 2018-06-08 Certified RobustnessRobustnessDeep Learning Technology 2017.11.02 2025.05.28 Literature Database