Bypassing Feature Squeezing by Increasing Adversary Strength

Authors: Yash Sharma, Pin-Yu Chen | Published: 2018-03-27

Resilient Active Information Gathering with Mobile Robots

Authors: Brent Schlotfeldt, Vasileios Tzoumas, Dinesh Thakur, George J. Pappas | Published: 2018-03-26 | Updated: 2018-09-02

On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples

Authors: Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu | Published: 2018-03-26

Clipping free attacks against artificial neural networks

Authors: Boussad Addad, Jerome Kodjabachian, Christophe Meyer | Published: 2018-03-26 | Updated: 2018-03-28

Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks

Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Joung Woo Ryu | Published: 2018-03-24

A Dynamic-Adversarial Mining Approach to the Security of Machine Learning

Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Lingyu Lyua, Jiashun Chen | Published: 2018-03-24

Datasheets for Datasets

Authors: Timnit Gebru, Jamie Morgenstern, Briana Vecchione, Jennifer Wortman Vaughan, Hanna Wallach, Hal Daumé III, Kate Crawford | Published: 2018-03-23 | Updated: 2021-12-01

Improving DNN Robustness to Adversarial Attacks using Jacobian Regularization

Authors: Daniel Jakubovitz, Raja Giryes | Published: 2018-03-23 | Updated: 2019-05-28

Robust Blind Deconvolution via Mirror Descent

Authors: Sathya N. Ravi, Ronak Mehta, Vikas Singh | Published: 2018-03-21

Adversarial Defense based on Structure-to-Signal Autoencoders

Authors: Joachim Folz, Sebastian Palacio, Joern Hees, Damian Borth, Andreas Dengel | Published: 2018-03-21