firstbacksecondback
15 Results
Poster
|
Tue 14:30 |
signSGD via Zeroth-Order Oracle Sijia Liu · Pin-Yu Chen · Xiangyi Chen · Mingyi Hong |
|
Poster
|
Wed 14:30 |
Query-Efficient Hard-label Black-box Attack: An Optimization-based Approach Minhao Cheng · Thong M Le · Pin-Yu Chen · Huan Zhang · Jinfeng Yi · Cho-Jui Hsieh |
|
Poster
|
Tue 14:30 |
Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors Andrew Ilyas · Logan Engstrom · Aleksander Madry |
|
Poster
|
Tue 9:00 |
Neural network gradient-based learning of black-box function interfaces Alon Jacovi · guy hadash · Einat Kermany · Boaz Carmeli · Ofer Lavi · George M. Kour · Jonathan Berant |
|
Workshop
|
Mon 15:30 |
Don’t debug your black box, replace it Cynthia Rudin |
|
Poster
|
Thu 9:00 |
Detecting Egregious Responses in Neural Sequence-to-sequence Models Tianxing He · James R Glass |
|
Poster
|
Tue 14:30 |
Boosting Robustness Certification of Neural Networks Gagandeep Singh · Timon Gehr · Markus Püschel · Martin Vechev |
|
Poster
|
Tue 14:30 |
Adversarial Attacks on Graph Neural Networks via Meta Learning Daniel Zügner · Stephan Günnemann |
|
Poster
|
Tue 14:30 |
PeerNets: Exploiting Peer Wisdom Against Adversarial Attacks Jan Svoboda · Jonathan Masci · Federico Monti · Michael Bronstein · Leonidas Guibas |
|
Poster
|
Tue 14:30 |
Defensive Quantization: When Efficiency Meets Robustness Ji Lin · Chuang Gan · Song Han |
|
Poster
|
Tue 14:30 |
Generalizable Adversarial Training via Spectral Normalization Farzan Farnia · Jesse Zhang · David Tse |
|
Poster
|
Thu 9:00 |
Complement Objective Training Hao-Yun Chen · Pei-Hsin Wang · Chun-Hao Liu · Shih-Chieh Chang · Jia-Yu Pan · Yu-Ting Chen · Wei Wei · Da-Cheng Juan |