Picture for Maxime Cordy

Maxime Cordy

Robustness Analysis of AI Models in Critical Energy Systems

Add code
Jun 20, 2024
Figure 1 for Robustness Analysis of AI Models in Critical Energy Systems
Figure 2 for Robustness Analysis of AI Models in Critical Energy Systems
Figure 3 for Robustness Analysis of AI Models in Critical Energy Systems
Figure 4 for Robustness Analysis of AI Models in Critical Energy Systems
Viaarxiv icon

Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data

Add code
Jun 02, 2024
Figure 1 for Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data
Figure 2 for Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data
Figure 3 for Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data
Figure 4 for Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data
Viaarxiv icon

Enhancing Fault Detection for Large Language Models via Mutation-Based Confidence Smoothing

Add code
Apr 14, 2024
Figure 1 for Enhancing Fault Detection for Large Language Models via Mutation-Based Confidence Smoothing
Figure 2 for Enhancing Fault Detection for Large Language Models via Mutation-Based Confidence Smoothing
Figure 3 for Enhancing Fault Detection for Large Language Models via Mutation-Based Confidence Smoothing
Figure 4 for Enhancing Fault Detection for Large Language Models via Mutation-Based Confidence Smoothing
Viaarxiv icon

Importance Guided Data Augmentation for Neural-Based Code Understanding

Add code
Feb 24, 2024
Viaarxiv icon

How Realistic Is Your Synthetic Data? Constraining Deep Generative Models for Tabular Data

Add code
Feb 07, 2024
Figure 1 for How Realistic Is Your Synthetic Data? Constraining Deep Generative Models for Tabular Data
Figure 2 for How Realistic Is Your Synthetic Data? Constraining Deep Generative Models for Tabular Data
Figure 3 for How Realistic Is Your Synthetic Data? Constraining Deep Generative Models for Tabular Data
Figure 4 for How Realistic Is Your Synthetic Data? Constraining Deep Generative Models for Tabular Data
Viaarxiv icon

Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data

Add code
Nov 08, 2023
Figure 1 for Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data
Figure 2 for Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data
Figure 3 for Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data
Figure 4 for Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data
Viaarxiv icon

Hazards in Deep Learning Testing: Prevalence, Impact and Recommendations

Add code
Sep 11, 2023
Viaarxiv icon

Evaluating the Robustness of Test Selection Methods for Deep Neural Networks

Add code
Jul 29, 2023
Viaarxiv icon

How do humans perceive adversarial text? A reality check on the validity and naturalness of word-based adversarial attacks

Add code
May 24, 2023
Figure 1 for How do humans perceive adversarial text? A reality check on the validity and naturalness of word-based adversarial attacks
Figure 2 for How do humans perceive adversarial text? A reality check on the validity and naturalness of word-based adversarial attacks
Figure 3 for How do humans perceive adversarial text? A reality check on the validity and naturalness of word-based adversarial attacks
Figure 4 for How do humans perceive adversarial text? A reality check on the validity and naturalness of word-based adversarial attacks
Viaarxiv icon

Going Further: Flatness at the Rescue of Early Stopping for Adversarial Example Transferability

Add code
Apr 05, 2023
Figure 1 for Going Further: Flatness at the Rescue of Early Stopping for Adversarial Example Transferability
Figure 2 for Going Further: Flatness at the Rescue of Early Stopping for Adversarial Example Transferability
Figure 3 for Going Further: Flatness at the Rescue of Early Stopping for Adversarial Example Transferability
Figure 4 for Going Further: Flatness at the Rescue of Early Stopping for Adversarial Example Transferability
Viaarxiv icon