firstbacksecondback
96 Results
Poster
|
Tue 9:00 |
Collaborative Linear Bandits with Adversarial Agents: Near-Optimal Regret Bounds Aritra Mitra · Arman Adibi · George J. Pappas · Hamed Hassani |
|
Poster
|
Tue 14:00 |
Double Bubble, Toil and Trouble: Enhancing Certified Robustness through Transitivity Andrew Cullen · Paul Montague · Shijie Liu · Sarah Erfani · Benjamin Rubinstein |
|
Poster
|
Defending Against Adversarial Attacks via Neural Dynamic System Xiyuan Li · Zou Xin · Weiwei Liu |
||
Poster
|
Tue 14:00 |
Reconstructing Training Data From Trained Neural Networks Niv Haim · Gal Vardi · Gilad Yehudai · Ohad Shamir · Michal Irani |
|
Poster
|
Tue 9:00 |
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks Sizhe Chen · Zhehao Huang · Qinghua Tao · Yingwen Wu · Cihang Xie · Xiaolin Huang |
|
Poster
|
Thu 14:00 |
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection Yiming Li · Yang Bai · Yong Jiang · Yong Yang · Shu-Tao Xia · Bo Li |
|
Poster
|
Tue 9:00 |
Practical Adversarial Attacks on Spatiotemporal Traffic Forecasting Models Fan LIU · Hao Liu · Wenzhao Jiang |
|
Poster
|
Wed 14:00 |
MI: Multi-modal Models Membership Inference Pingyi Hu · Zihan Wang · Ruoxi Sun · Hu Wang · Minhui Xue |
|
Poster
|
Adversarial Training with Complementary Labels: On the Benefit of Gradually Informative Attacks Jianan Zhou · Jianing Zhu · Jingfeng ZHANG · Tongliang Liu · Gang Niu · Bo Han · Masashi Sugiyama |
||
Poster
|
Wed 14:00 |
Increasing Confidence in Adversarial Robustness Evaluations Roland S. Zimmermann · Wieland Brendel · Florian Tramer · Nicholas Carlini |
|
Poster
|
Thu 9:00 |
On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses Anshuman Chhabra · Ashwin Sekhari · Prasant Mohapatra |
|
Poster
|
Thu 14:00 |
Formulating Robustness Against Unforeseen Attacks Sihui Dai · Saeed Mahloujifar · Prateek Mittal |