Alert button
Picture for Florens Greßner

Florens Greßner

Alert button

A Framework for Verification of Wasserstein Adversarial Robustness

Add code
Bookmark button
Alert button
Oct 13, 2021
Tobias Wegel, Felix Assion, David Mickisch, Florens Greßner

Figure 1 for A Framework for Verification of Wasserstein Adversarial Robustness
Figure 2 for A Framework for Verification of Wasserstein Adversarial Robustness
Figure 3 for A Framework for Verification of Wasserstein Adversarial Robustness
Figure 4 for A Framework for Verification of Wasserstein Adversarial Robustness
Viaarxiv icon

Risk Assessment for Machine Learning Models

Add code
Bookmark button
Alert button
Nov 09, 2020
Paul Schwerdtner, Florens Greßner, Nikhil Kapoor, Felix Assion, René Sass, Wiebke Günther, Fabian Hüger, Peter Schlicht

Figure 1 for Risk Assessment for Machine Learning Models
Figure 2 for Risk Assessment for Machine Learning Models
Figure 3 for Risk Assessment for Machine Learning Models
Figure 4 for Risk Assessment for Machine Learning Models
Viaarxiv icon

Understanding the Decision Boundary of Deep Neural Networks: An Empirical Study

Add code
Bookmark button
Alert button
Feb 05, 2020
David Mickisch, Felix Assion, Florens Greßner, Wiebke Günther, Mariele Motta

Figure 1 for Understanding the Decision Boundary of Deep Neural Networks: An Empirical Study
Figure 2 for Understanding the Decision Boundary of Deep Neural Networks: An Empirical Study
Figure 3 for Understanding the Decision Boundary of Deep Neural Networks: An Empirical Study
Figure 4 for Understanding the Decision Boundary of Deep Neural Networks: An Empirical Study
Viaarxiv icon

The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks

Add code
Bookmark button
Alert button
Jun 17, 2019
Felix Assion, Peter Schlicht, Florens Greßner, Wiebke Günther, Fabian Hüger, Nico Schmidt, Umair Rasheed

Figure 1 for The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks
Figure 2 for The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks
Figure 3 for The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks
Viaarxiv icon