Alert button
Picture for Kenneth T. Co

Kenneth T. Co

Alert button

Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks

Add code
Bookmark button
Alert button
Apr 19, 2022
Kenneth T. Co, David Martinez-Rego, Zhongyuan Hau, Emil C. Lupu

Figure 1 for Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Figure 2 for Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Figure 3 for Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Figure 4 for Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Viaarxiv icon

Real-time Detection of Practical Universal Adversarial Perturbations

Add code
Bookmark button
Alert button
May 22, 2021
Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Emil C. Lupu

Figure 1 for Real-time Detection of Practical Universal Adversarial Perturbations
Figure 2 for Real-time Detection of Practical Universal Adversarial Perturbations
Figure 3 for Real-time Detection of Practical Universal Adversarial Perturbations
Figure 4 for Real-time Detection of Practical Universal Adversarial Perturbations
Viaarxiv icon

Jacobian Regularization for Mitigating Universal Adversarial Perturbations

Add code
Bookmark button
Alert button
Apr 21, 2021
Kenneth T. Co, David Martinez Rego, Emil C. Lupu

Figure 1 for Jacobian Regularization for Mitigating Universal Adversarial Perturbations
Figure 2 for Jacobian Regularization for Mitigating Universal Adversarial Perturbations
Figure 3 for Jacobian Regularization for Mitigating Universal Adversarial Perturbations
Figure 4 for Jacobian Regularization for Mitigating Universal Adversarial Perturbations
Viaarxiv icon

Object Removal Attacks on LiDAR-based 3D Object Detectors

Add code
Bookmark button
Alert button
Feb 07, 2021
Zhongyuan Hau, Kenneth T. Co, Soteris Demetriou, Emil C. Lupu

Figure 1 for Object Removal Attacks on LiDAR-based 3D Object Detectors
Figure 2 for Object Removal Attacks on LiDAR-based 3D Object Detectors
Figure 3 for Object Removal Attacks on LiDAR-based 3D Object Detectors
Viaarxiv icon

Robustness and Transferability of Universal Attacks on Compressed Models

Add code
Bookmark button
Alert button
Dec 10, 2020
Alberto G. Matachana, Kenneth T. Co, Luis Muñoz-González, David Martinez, Emil C. Lupu

Figure 1 for Robustness and Transferability of Universal Attacks on Compressed Models
Figure 2 for Robustness and Transferability of Universal Attacks on Compressed Models
Figure 3 for Robustness and Transferability of Universal Attacks on Compressed Models
Figure 4 for Robustness and Transferability of Universal Attacks on Compressed Models
Viaarxiv icon

Universal Adversarial Perturbations to Understand Robustness of Texture vs. Shape-biased Training

Add code
Bookmark button
Alert button
Nov 23, 2019
Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Ben Glocker, Emil C. Lupu

Figure 1 for Universal Adversarial Perturbations to Understand Robustness of Texture vs. Shape-biased Training
Figure 2 for Universal Adversarial Perturbations to Understand Robustness of Texture vs. Shape-biased Training
Figure 3 for Universal Adversarial Perturbations to Understand Robustness of Texture vs. Shape-biased Training
Figure 4 for Universal Adversarial Perturbations to Understand Robustness of Texture vs. Shape-biased Training
Viaarxiv icon

Byzantine-Robust Federated Machine Learning through Adaptive Model Averaging

Add code
Bookmark button
Alert button
Sep 11, 2019
Luis Muñoz-González, Kenneth T. Co, Emil C. Lupu

Figure 1 for Byzantine-Robust Federated Machine Learning through Adaptive Model Averaging
Figure 2 for Byzantine-Robust Federated Machine Learning through Adaptive Model Averaging
Figure 3 for Byzantine-Robust Federated Machine Learning through Adaptive Model Averaging
Figure 4 for Byzantine-Robust Federated Machine Learning through Adaptive Model Averaging
Viaarxiv icon

Sensitivity of Deep Convolutional Networks to Gabor Noise

Add code
Bookmark button
Alert button
Jun 11, 2019
Kenneth T. Co, Luis Muñoz-González, Emil C. Lupu

Figure 1 for Sensitivity of Deep Convolutional Networks to Gabor Noise
Figure 2 for Sensitivity of Deep Convolutional Networks to Gabor Noise
Figure 3 for Sensitivity of Deep Convolutional Networks to Gabor Noise
Figure 4 for Sensitivity of Deep Convolutional Networks to Gabor Noise
Viaarxiv icon

Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Neural Networks

Add code
Bookmark button
Alert button
Sep 30, 2018
Kenneth T. Co, Luis Muñoz-González, Emil C. Lupu

Figure 1 for Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Neural Networks
Figure 2 for Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Neural Networks
Figure 3 for Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Neural Networks
Figure 4 for Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Neural Networks
Viaarxiv icon