firstbacksecondback
Filter by Keyword:
140 Results
Poster
|
Tue 8:30 |
The Many Faces of Adversarial Risk Muni Sreenivas Pydi · Varun Jog |
|
Poster
|
Fri 8:30 |
On Linear Stability of SGD and Input-Smoothness of Neural Networks Chao Ma · Lexing Ying |
|
Poster
|
Tue 16:30 |
Excess Capacity and Backdoor Poisoning Naren Manoj · Avrim Blum |
|
Poster
|
Tue 8:30 |
Automated Discovery of Adaptive Attacks on Adversarial Defenses Chengyuan Yao · Pavol Bielik · Petar Tsankov · Martin Vechev |
|
Poster
|
Wed 0:30 |
Do Input Gradients Highlight Discriminative Features? Harshay Shah · Prateek Jain · Praneeth Netrapalli |
|
Poster
|
Wed 0:30 |
Alignment Attention by Matching Key and Query Distributions Shujian Zhang · Xinjie Fan · Huangjie Zheng · Korawat Tanwisuth · Mingyuan Zhou |
|
Poster
|
Tue 8:30 |
Finding Optimal Tangent Points for Reducing Distortions of Hard-label Attacks Chen Ma · Xiangyu Guo · Li Chen · Jun-Hai Yong · Yisen Wang |
|
Poster
|
Tue 8:30 |
Overinterpretation reveals image classification model pathologies Brandon Carter · Siddhartha Jain · Jonas Mueller · David Gifford |
|
Poster
|
Tue 8:30 |
Adversarial Examples Make Strong Poisons Liam Fowl · Micah Goldblum · Ping-yeh Chiang · Jonas Geiping · Wojciech Czaja · Tom Goldstein |
|
Poster
|
Tue 8:30 |
Random Noise Defense Against Query-Based Black-Box Attacks Zeyu Qin · Yanbo Fan · Hongyuan Zha · Baoyuan Wu |
|
Poster
|
Tue 8:30 |
Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams Chawin Sitawarin · Evgenios Kornaropoulos · Dawn Song · David Wagner |
|
Poster
|
Wed 16:30 |
Adversarial Attack Generation Empowered by Min-Max Optimization Jingkang Wang · Tianyun Zhang · Sijia Liu · Pin-Yu Chen · Jiacen Xu · Makan Fardad · Bo Li |