Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation

Authors: Alexander Levine, Soheil Feizi | Published: 2019-11-21

Fine-grained Synthesis of Unrestricted Adversarial Examples

Authors: Omid Poursaeed, Tianxing Jiang, Yordanos Goshu, Harry Yang, Serge Belongie, Ser-Nam Lim | Published: 2019-11-20 | Updated: 2020-10-22

Deep Minimax Probability Machine

Authors: Lirong He, Ziyi Guo, Kaizhu Huang, Zenglin Xu | Published: 2019-11-20

Cognitive Internet of Vehicles: Motivation, Layered Architecture and Security Issues

Authors: Khondokar Fida Hasan, Tarandeep Kaur, Md. Mhedi Hasan, Yanming Feng | Published: 2019-11-20

Adversarial Robustness of Flow-Based Generative Models

Authors: Phillip Pope, Yogesh Balaji, Soheil Feizi | Published: 2019-11-20

Generate (non-software) Bugs to Fool Classifiers

Authors: Hiromu Yakura, Youhei Akimoto, Jun Sakuma | Published: 2019-11-20

Sieving Fake News From Genuine: A Synopsis

Authors: Shahid Alam, Abdulaziz Ravshanbekov | Published: 2019-11-19

Towards non-toxic landscapes: Automatic toxic comment detection using DNN

Authors: Ashwin Geet D'Sa, Irina Illina, Dominique Fohr | Published: 2019-11-19 | Updated: 2020-09-16

Deep Detector Health Management under Adversarial Campaigns

Authors: Javier Echauz, Keith Kenemer, Sarfaraz Hussein, Jay Dhaliwal, Saurabh Shintre, Slawomir Grzonkowski, Andrew Gardner | Published: 2019-11-19

Attack on Grid Event Cause Analysis: An Adversarial Machine Learning Approach

Authors: Iman Niazazari, Hanif Livani | Published: 2019-11-19 | Updated: 2019-11-25