1 research outputs found
Adversarial Attacks and Defenses
- Author
- Allen-Zhu Zeyuan
- Athalye Anish
- Baker Nicholas
- Barbu Andrei
- Battaglia Peter W
- Bengio Yoshua
- Brown Tom B
- Brown Tom B
- Che Zhengping
- Chen Chaofan
- Dabkowski Piotr
- Dhurandhar Amit
- Dombrowski Ann-Kathrin
- Dong Yinpeng
- Doshi-Velez Finale
- Erhan Dumitru
- Feinman Reuben
- Fidel Gil
- Gao Jun
- Ghorbani Amirata
- Gong Zhitao
- Goodfellow Ian J
- Goyal Yash
- Grosse Kathrin
- Gu Tianyu
- Guo Wenbo
- Hamilton William L
- Harradon Michael
- Hempel Carl G
- Higgins Irina
- Ilyas Andrew
- Kang Jian
- Kim Been
- Kim Been
- Kim Been
- Koh Pang Wei
- Kurakin Alexey
- Kurakin Alexey
- Lei Qi
- Levine Alexander
- Li Jiwei
- Liu Ninghao
- Lombrozo Tania
- Lundberg Scott M
- Ma Jianxin
- Madry Aleksander
- Mathew Binny
- Metzen Jan Hendrik
- Montavon Gr´egoire
- Mopuri Konda Reddy
- Murdoch W James
- Narayanan Menaka
- Narendra Tanmayee
- Panigrahi Abhishek
- Papernot Nicolas
- Papernot Nicolas
- Raha
- Sabour Sara
- Santurkar Shibani
- Sharif Mahmood
- Shi Baifeng
- Simonyan Karen
- Smilkov Daniel
- Song Dawn
- Sundararajan Mukund
- Szegedy Christian
- Tao Guanhong
- Tram'er Florian
- Tsipras Dimitris
- Wachter Sandra
- Xie Cihang
- Xie Cihang
- Xie Cihang
- Xu Weilin
- Yang Fan
- Yang Puyudi
- Young Tom
- Zhang Hongyang
- Zhang Tianyuan
- Zhou Qinghai
- Zhu Ligeng
- ´c Petar
- Publication venue
- 'Association for Computing Machinery (ACM)'
- Publication date
- Field of study