TensorShield: Tensor-based Defense Against Adversarial Attacks on Images Authors: Negin Entezari, Evangelos E. Papalexakis | Published: 2020-02-18 Performance EvaluationAdversarial ExampleDefense Method 2020.02.18 2025.05.28 Literature Database
Data and Model Dependencies of Membership Inference Attack Authors: Shakila Mahjabin Tonni, Dinusha Vatsalan, Farhad Farokhi, Dali Kaafar, Zhigang Lu, Gioacchino Tangari | Published: 2020-02-17 | Updated: 2020-07-25 Training MethodModel Selection MethodDefense Method 2020.02.17 2025.05.28 Literature Database
Undersensitivity in Neural Reading Comprehension Authors: Johannes Welbl, Pasquale Minervini, Max Bartolo, Pontus Stenetorp, Sebastian Riedel | Published: 2020-02-15 Training MethodVulnerability Attack MethodDefense Method 2020.02.15 2025.05.28 Literature Database
Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets Authors: Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey, Xingjun Ma | Published: 2020-02-14 PoisoningAdversarial Attack DetectionDefense Method 2020.02.14 2025.05.28 Literature Database
Politics of Adversarial Machine Learning Authors: Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar | Published: 2020-02-01 | Updated: 2020-04-26 Membership InferenceHuman Rights and TechnologyDefense Method 2020.02.01 2025.05.28 Literature Database
Adversarial Robustness Assessment: Why both $L_0$ and $L_\infty$ Attacks Are Necessary Authors: Shashank Kotyan, Danilo Vasconcellos Vargas | Published: 2019-06-14 | Updated: 2020-07-16 Adversarial ExampleAdversarial LearningDefense Method 2019.06.14 2025.05.28 Literature Database
Deep Reinforcement Learning for Cyber Security Authors: Thanh Thi Nguyen, Vijay Janapa Reddi | Published: 2019-06-13 | Updated: 2021-11-02 Automation of CybersecurityDeep Reinforcement LearningDefense Method 2019.06.13 2025.05.28 Literature Database
Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective Authors: Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, Xue Lin | Published: 2019-06-10 | Updated: 2019-10-14 Adversarial LearningSelection and Evaluation of Optimization AlgorithmsDefense Method 2019.06.10 2025.05.28 Literature Database
Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers Authors: Hadi Salman, Greg Yang, Jerry Li, Pengchuan Zhang, Huan Zhang, Ilya Razenshteyn, Sebastien Bubeck | Published: 2019-06-09 | Updated: 2020-01-10 PoisoningAdversarial LearningDefense Method 2019.06.09 2025.05.28 Literature Database
Adversarial Attack Generation Empowered by Min-Max Optimization Authors: Jingkang Wang, Tianyun Zhang, Sijia Liu, Pin-Yu Chen, Jiacen Xu, Makan Fardad, Bo Li | Published: 2019-06-09 | Updated: 2021-11-01 Adversarial LearningDeep LearningDefense Method 2019.06.09 2025.05.28 Literature Database