Exposing DeepFake Videos By Detecting Face Warping Artifacts Authors: Yuezun Li, Siwei Lyu | Published: 2018-11-01 | Updated: 2019-05-22 2018.11.01 2025.04.03 文献データベース
Defining a Metric Space of Host Logs and Operational Use Cases Authors: Miki E. Verma, Robert A. Bridges | Published: 2018-11-01 2018.11.01 2025.04.03 文献データベース
Auditing Data Provenance in Text-Generation Models Authors: Congzheng Song, Vitaly Shmatikov | Published: 2018-11-01 | Updated: 2019-05-17 2018.11.01 2025.04.03 文献データベース
Excessive Invariance Causes Adversarial Vulnerability Authors: Jörn-Henrik Jacobsen, Jens Behrmann, Richard Zemel, Matthias Bethge | Published: 2018-11-01 | Updated: 2020-07-12 2018.11.01 2025.04.03 文献データベース
Conditionals in Homomorphic Encryption and Machine Learning Applications Authors: Diego Chialva, Ann Dooms | Published: 2018-10-29 | Updated: 2019-05-09 2018.10.29 2025.04.03 文献データベース
Logit Pairing Methods Can Fool Gradient-Based Attacks Authors: Marius Mosbach, Maksym Andriushchenko, Thomas Trost, Matthias Hein, Dietrich Klakow | Published: 2018-10-29 | Updated: 2019-03-12 2018.10.29 2025.04.03 文献データベース
Rademacher Complexity for Adversarially Robust Generalization Authors: Dong Yin, Kannan Ramchandran, Peter Bartlett | Published: 2018-10-29 | Updated: 2020-07-29 2018.10.29 2025.04.03 文献データベース
Learning with Bad Training Data via Iterative Trimmed Loss Minimization Authors: Yanyao Shen, Sujay Sanghavi | Published: 2018-10-28 | Updated: 2019-02-18 2018.10.28 2025.04.03 文献データベース
Robust Audio Adversarial Example for a Physical Attack Authors: Hiromu Yakura, Jun Sakuma | Published: 2018-10-28 | Updated: 2019-08-19 2018.10.28 2025.04.03 文献データベース
RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications Authors: Huan Zhang, Pengchuan Zhang, Cho-Jui Hsieh | Published: 2018-10-28 | Updated: 2019-02-27 2018.10.28 2025.04.03 文献データベース