Multi-Step Adversarial Perturbations on Recommender Systems Embeddings

Authors: Vito Walter Anelli, Alejandro Bellogín, Yashar Deldjoo, Tommaso Di Noia, Felice Antonio Merra | Published: 2020-10-03

Do Wider Neural Networks Really Help Adversarial Robustness?

Authors: Boxi Wu, Jinghui Chen, Deng Cai, Xiaofei He, Quanquan Gu | Published: 2020-10-03 | Updated: 2021-08-14

CorrAttack: Black-box Adversarial Attack with Structured Search

Authors: Zhichao Huang, Yaowei Huang, Tong Zhang | Published: 2020-10-03

Query complexity of adversarial attacks

Authors: Grzegorz Głuch, Rüdiger Urbanke | Published: 2020-10-02 | Updated: 2021-02-10

An alternative proof of the vulnerability of retrieval in high intrinsic dimensionality neighborhood

Authors: Teddy Furon | Published: 2020-10-02 | Updated: 2022-05-20

Deep learning for time series classification

Authors: Hassan Ismail Fawaz | Published: 2020-10-01

Bag of Tricks for Adversarial Training

Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu | Published: 2020-10-01 | Updated: 2021-03-31

Erratum Concerning the Obfuscated Gradients Attack on Stochastic Activation Pruning

Authors: Guneet S. Dhillon, Nicholas Carlini | Published: 2020-09-30

DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles

Authors: Huanrui Yang, Jingyang Zhang, Hongliang Dong, Nathan Inkawhich, Andrew Gardner, Andrew Touchet, Wesley Wilkes, Heath Berry, Hai Li | Published: 2020-09-30 | Updated: 2020-10-18

Uncertainty-Matching Graph Neural Networks to Defend Against Poisoning Attacks

Authors: Uday Shankar Shanthamallu, Jayaraman J. Thiagarajan, Andreas Spanias | Published: 2020-09-30