Accelerate adversarial training with loss guided propagation for robust image classification

[1]  S. Ananiadou,et al.  A mental state Knowledge-aware and Contrastive Network for early stress and depression detection on social media , 2022, Inf. Process. Manag..

[2]  Zhi Zhong,et al.  Adaptive and structured graph learning for semi-supervised clustering , 2022, Inf. Process. Manag..

[3]  Shuicheng Yan,et al.  A Survey on Concept Factorization: From Shallow to Deep Representation Learning , 2020, Inf. Process. Manag..

[4]  Yu Cheng,et al.  Large-Scale Adversarial Training for Vision-and-Language Representation Learning , 2020, NeurIPS.

[5]  Lin-shan Lee,et al.  Defending Your Voice: Adversarial Attack on Voice Conversion , 2020, 2021 IEEE Spoken Language Technology Workshop (SLT).

[6]  Yisen Wang,et al.  Adversarial Weight Perturbation Helps Robust Generalization , 2020, NeurIPS.

[7]  Siddhant Garg,et al.  BAE: BERT-based Adversarial Examples for Text Classification , 2020, EMNLP.

[8]  Stefano Ermon,et al.  Diversity can be Transferred: Output Diversification for White- and Black-box Attacks , 2020, NeurIPS.

[9]  Yingying Chen,et al.  Real-Time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems , 2020, IEEE International Conference on Acoustics, Speech, and Signal Processing.

[10]  Matthias Hein,et al.  Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks , 2020, ICML.

[11]  Mohan S. Kankanhalli,et al.  Attacks Which Do Not Kill Training Make Adversarial Learning Stronger , 2020, ICML.

[12]  Hang Su,et al.  Boosting Adversarial Training with Hypersphere Embedding , 2020, NeurIPS.

[13]  Nicolas Flammarion,et al.  Square Attack: a query-efficient black-box adversarial attack via random search , 2019, ECCV.

[14]  Quanfu Fan,et al.  Adversarial T-Shirt! Evading Person Detectors in a Physical World , 2019, ECCV.

[15]  Zhanxing Zhu,et al.  Amata: An Annealing Mechanism for Adversarial Training Acceleration , 2019, AAAI.

[16]  Aleksandr Petiushko,et al.  AdvHat: Real-World Adversarial Attack on ArcFace Face ID System , 2019, 2020 25th International Conference on Pattern Recognition (ICPR).

[17]  Haichao Zhang,et al.  Defense Against Adversarial Attacks Using Feature Scattering-based Adversarial Training , 2019, NeurIPS.

[18]  Gang Wang,et al.  Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks , 2019, AAAI.

[19]  Matthias Hein,et al.  Minimally distorted Adversarial Examples with a Fast Adaptive Boundary Attack , 2019, ICML.

[20]  Ludwig Schmidt,et al.  Unlabeled Data Improves Adversarial Robustness , 2019, NeurIPS.

[21]  Seyed-Mohsen Moosavi-Dezfooli,et al.  Universal Adversarial Attacks on Text Classifiers , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[22]  Michael I. Jordan,et al.  Theoretically Principled Trade-off between Robustness and Accuracy , 2019, ICML.

[23]  Hao Su,et al.  Extending Adversarial Attacks and Defenses to Deep 3D Point Cloud Classifiers , 2019, 2019 IEEE International Conference on Image Processing (ICIP).

[24]  Richa Singh,et al.  SmartBox: Benchmarking Adversarial Detection and Mitigation Algorithms for Face Recognition , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[25]  Kui Ren,et al.  Distributionally Adversarial Attack , 2018, AAAI.

[26]  Shuicheng Yan,et al.  Robust Adaptive Embedded Label Propagation With Weight Learning for Inductive Classification , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[27]  Shuicheng Yan,et al.  Jointly Learning Structured Analysis Discriminative Dictionary and Analysis Multiclass Classifier , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[28]  Hongxia Yang,et al.  Adversarial Detection with Model Interpretation , 2018, KDD.

[29]  Zhao Zhang,et al.  Adaptive Neighborhood Propagation by Joint L2,1-Norm Regularized Sparse Coding for Representation and Classification , 2016, 2016 IEEE 16th International Conference on Data Mining (ICDM).

[30]  Lujo Bauer,et al.  Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.

[31]  David A. Wagner,et al.  Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[32]  Li Zhang,et al.  Joint Low-Rank and Sparse Principal Feature Coding for Enhanced Robust Representation and Visual Classification , 2016, IEEE Transactions on Image Processing.

[33]  Ananthram Swami,et al.  The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[34]  Kaiming He,et al.  Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[35]  Thomas Brox,et al.  U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.