Poster
|
Wed 17:00
|
Effective and Efficient Vote Attack on Capsule Networks
Jindong Gu · Baoyuan Wu · Volker Tresp
|
|
Poster
|
Wed 9:00
|
Provably robust classification of adversarial examples with detection
Fatemeh Sheikholeslami · Ali Lotfi · Zico Kolter
|
|
Workshop
|
|
Simple Transparent Adversarial Examples
Jaydeep Borkar
|
|
Workshop
|
|
FIRM: Detecting Adversarial Audios by Recursive Filters with Randomization
Guanhong Tao
|
|
Workshop
|
|
PatchGuard++: Efficient Provable Attack Detection against Adversarial Patches
Chong Xiang
|
|
Workshop
|
|
Adversarial Examples Make Stronger Poisons
Liam H Fowl · Micah Goldblum · Ping-yeh Chiang · Jonas Geiping · Tom Goldstein
|
|
Poster
|
Wed 1:00
|
Bag of Tricks for Adversarial Training
Tianyu Pang · Xiao Yang · Yinpeng Dong · Hang Su · Jun Zhu
|
|
Spotlight
|
Wed 4:40
|
Deep Neural Network Fingerprinting by Conferrable Adversarial Examples
Nils Lukas · Yuxuan Zhang · Florian Kerschbaum
|
|
Poster
|
Wed 1:00
|
Deep Neural Network Fingerprinting by Conferrable Adversarial Examples
Nils Lukas · Yuxuan Zhang · Florian Kerschbaum
|
|
Workshop
|
|
Detecting Adversarial Attacks through Neural Activations
Graham Annett
|
|
Spotlight
|
Thu 4:35
|
Unlearnable Examples: Making Personal Data Unexploitable
Hanxun Huang · Xingjun Ma · Sarah Erfani · James Bailey · Yisen Wang
|
|
Poster
|
Mon 17:00
|
Unlearnable Examples: Making Personal Data Unexploitable
Hanxun Huang · Xingjun Ma · Sarah Erfani · James Bailey · Yisen Wang
|
|