Defending Substitution-Based Profile Pollution Attacks on Sequential Recommenders Jul 19, 2022 Adversarial Attack Adversarial Defense
Code Code Available 0Multi-step domain adaptation by adversarial attack to H ΔH-divergence Jul 18, 2022 Adversarial Attack Domain Adaptation
— Unverified 0DIMBA: Discretely Masked Black-Box Attack in Single Object Tracking Jul 17, 2022 Adversarial Attack Miscellaneous
— Unverified 0Adversarial Examples for Model-Based Control: A Sensitivity Analysis Jul 14, 2022 Adversarial Attack Sensitivity
— Unverified 0How many perturbations break this model? Evaluating robustness beyond adversarial accuracy Jul 8, 2022 Adversarial Attack Adversarial Robustness
Code Code Available 0On the Relationship Between Adversarial Robustness and Decision Region in Deep Neural Network Jul 7, 2022 Adversarial Attack Adversarial Robustness
— Unverified 0Query-Efficient Adversarial Attack Based on Latin Hypercube Sampling Jul 5, 2022 Adversarial Attack
Code Code Available 0Learning to Accelerate Approximate Methods for Solving Integer Programming via Early Fixing Jul 5, 2022 Adversarial Attack Imitation Learning
Code Code Available 0RAF: Recursive Adversarial Attacks on Face Recognition Using Extremely Limited Queries Jul 4, 2022 Adversarial Attack Face Recognition
— Unverified 0ZhichunRoad at SemEval-2022 Task 2: Adversarial Training and Contrastive Learning for Multiword Representations Jul 1, 2022 Adversarial Attack Contrastive Learning
— Unverified 0Resilience of Named Entity Recognition Models under Adversarial Attack Jul 1, 2022 Adversarial Attack named-entity-recognition
Code Code Available 0SHARP: Search-Based Adversarial Attack for Structured Prediction Jul 1, 2022 Adversarial Attack Dependency Parsing
— Unverified 0Robustness of Explanation Methods for NLP Models Jun 24, 2022 Adversarial Attack Adversarial Robustness
— Unverified 0A Framework for Understanding Model Extraction Attack and Defense Jun 23, 2022 Adversarial Attack BIG-bench Machine Learning
— Unverified 0Adversarial Zoom Lens: A Novel Physical-World Attack to DNNs Jun 23, 2022 Adversarial Attack Autonomous Driving
— Unverified 0AdvSmo: Black-box Adversarial Attack by Smoothing Linear Structure of Texture Jun 22, 2022 Adversarial Attack Adversarial Defense
— Unverified 0SSMI: How to Make Objects of Interest Disappear without Accessing Object Detectors? Jun 22, 2022 Adversarial Attack Object
— Unverified 0Detecting Adversarial Examples in Batches -- a geometrical approach Jun 17, 2022 Adversarial Attack Adversarial Attack Detection
Code Code Available 0On the explainable properties of 1-Lipschitz Neural Networks: An Optimal Transport Perspective Jun 14, 2022 Adversarial Attack counterfactual
— Unverified 0Darknet Traffic Classification and Adversarial Attacks Jun 12, 2022 Adversarial Attack BIG-bench Machine Learning
— Unverified 0AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems Jun 7, 2022 Adversarial Attack Speaker Recognition
— Unverified 0Robust Adversarial Attacks Detection based on Explainable Deep Reinforcement Learning For UAV Guidance and Planning Jun 6, 2022 Adversarial Attack Decision Making
— Unverified 0Saliency Attack: Towards Imperceptible Black-box Adversarial Attack Jun 4, 2022 Adversarial Attack
Code Code Available 0Adversarial RAW: Image-Scaling Attack Against Imaging Pipeline Jun 2, 2022 Adversarial Attack
— Unverified 0Adversarial Laser Spot: Robust and Covert Physical-World Attack to DNNs Jun 2, 2022 Adversarial Attack
Code Code Available 0