Picture for David Wagner

David Wagner

Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams

Add code
Nov 19, 2020
Figure 1 for Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams
Figure 2 for Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams
Figure 3 for Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams
Figure 4 for Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams
Viaarxiv icon

Minority Reports Defense: Defending Against Adversarial Patches

Add code
Apr 28, 2020
Figure 1 for Minority Reports Defense: Defending Against Adversarial Patches
Figure 2 for Minority Reports Defense: Defending Against Adversarial Patches
Figure 3 for Minority Reports Defense: Defending Against Adversarial Patches
Figure 4 for Minority Reports Defense: Defending Against Adversarial Patches
Viaarxiv icon

Improving Adversarial Robustness Through Progressive Hardening

Add code
Mar 18, 2020
Figure 1 for Improving Adversarial Robustness Through Progressive Hardening
Figure 2 for Improving Adversarial Robustness Through Progressive Hardening
Figure 3 for Improving Adversarial Robustness Through Progressive Hardening
Figure 4 for Improving Adversarial Robustness Through Progressive Hardening
Viaarxiv icon

Minimum-Norm Adversarial Examples on KNN and KNN-Based Models

Add code
Mar 14, 2020
Figure 1 for Minimum-Norm Adversarial Examples on KNN and KNN-Based Models
Figure 2 for Minimum-Norm Adversarial Examples on KNN and KNN-Based Models
Viaarxiv icon

Stateful Detection of Black-Box Adversarial Attacks

Add code
Jul 12, 2019
Figure 1 for Stateful Detection of Black-Box Adversarial Attacks
Figure 2 for Stateful Detection of Black-Box Adversarial Attacks
Figure 3 for Stateful Detection of Black-Box Adversarial Attacks
Figure 4 for Stateful Detection of Black-Box Adversarial Attacks
Viaarxiv icon

Defending Against Adversarial Examples with K-Nearest Neighbor

Add code
Jun 23, 2019
Figure 1 for Defending Against Adversarial Examples with K-Nearest Neighbor
Figure 2 for Defending Against Adversarial Examples with K-Nearest Neighbor
Figure 3 for Defending Against Adversarial Examples with K-Nearest Neighbor
Figure 4 for Defending Against Adversarial Examples with K-Nearest Neighbor
Viaarxiv icon

On the Robustness of Deep K-Nearest Neighbors

Add code
Mar 20, 2019
Figure 1 for On the Robustness of Deep K-Nearest Neighbors
Figure 2 for On the Robustness of Deep K-Nearest Neighbors
Figure 3 for On the Robustness of Deep K-Nearest Neighbors
Figure 4 for On the Robustness of Deep K-Nearest Neighbors
Viaarxiv icon

Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples

Add code
Jul 31, 2018
Figure 1 for Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples
Figure 2 for Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples
Figure 3 for Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples
Viaarxiv icon

Audio Adversarial Examples: Targeted Attacks on Speech-to-Text

Add code
Mar 30, 2018
Figure 1 for Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Figure 2 for Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Figure 3 for Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Viaarxiv icon

MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples

Add code
Nov 22, 2017
Figure 1 for MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples
Figure 2 for MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples
Figure 3 for MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples
Figure 4 for MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples
Viaarxiv icon