There is Limited Correlation between Coverage and Robustness for Deep Neural Networks Authors: Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Dai Ting | Published: 2019-11-14 モデル性能評価敵対的サンプル敵対的攻撃手法 2019.11.14 2025.04.03 文献データベース
Adversarial Examples in Modern Machine Learning: A Review Authors: Rey Reza Wiyatno, Anqi Xu, Ousmane Dia, Archy de Berker | Published: 2019-11-13 | Updated: 2019-11-15 ポイズニング敵対的サンプル敵対的攻撃手法 2019.11.13 2025.04.03 文献データベース
On Robustness to Adversarial Examples and Polynomial Optimization Authors: Pranjal Awasthi, Abhratanu Dutta, Aravindan Vijayaraghavan | Published: 2019-11-12 モデル性能評価敵対的攻撃手法計算問題 2019.11.12 2025.04.03 文献データベース
Patch augmentation: Towards efficient decision boundaries for neural networks Authors: Marcus D. Bloice, Peter M. Roth, Andreas Holzinger | Published: 2019-11-08 | Updated: 2019-11-25 モデル性能評価敵対的攻撃手法特徴エンジニアリング 2019.11.08 2025.04.03 文献データベース
White-Box Target Attack for EEG-Based BCI Regression Problems Authors: Lubin Meng, Chin-Teng Lin, Tzyy-Ring Jung, Dongrui Wu | Published: 2019-11-07 モデル性能評価敵対的攻撃手法知識移転性 2019.11.07 2025.04.03 文献データベース
Confidence-Calibrated Adversarial Training: Generalizing to Unseen Attacks Authors: David Stutz, Matthias Hein, Bernt Schiele | Published: 2019-10-14 | Updated: 2020-06-30 ポイズニング攻撃の評価敵対的攻撃手法 2019.10.14 2025.04.03 文献データベース
Hear “No Evil”, See “Kenansville”: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems Authors: Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor | Published: 2019-10-11 攻撃の評価敵対的攻撃手法音声認識技術 2019.10.11 2025.04.03 文献データベース
Adversarial Training: embedding adversarial perturbations into the parameter space of a neural network to build a robust system Authors: Shixian Wen, Laurent Itti | Published: 2019-10-09 敵対的サンプル敵対的攻撃手法適応型敵対的訓練 2019.10.09 2025.04.03 文献データベース
Deep Latent Defence Authors: Giulio Zizzo, Chris Hankin, Sergio Maffeis, Kevin Jones | Published: 2019-10-09 | Updated: 2020-09-27 敵対的サンプル敵対的攻撃手法適応型敵対的訓練 2019.10.09 2025.04.03 文献データベース
Adversarial Learning of Deepfakes in Accounting Authors: Marco Schreyer, Timur Sattarov, Bernd Reimer, Damian Borth | Published: 2019-10-09 データ整合性制約敵対的攻撃手法生成的敵対ネットワーク 2019.10.09 2025.04.03 文献データベース