Alert button
Picture for Yi Xiang Marcus Tan

Yi Xiang Marcus Tan

Alert button

Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples

Add code
Bookmark button
Alert button
Oct 24, 2021
Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Ngai-man Cheung, Yuval Elovici, Alexander Binder

Figure 1 for Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples
Figure 2 for Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples
Figure 3 for Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples
Figure 4 for Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples
Viaarxiv icon

Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity

Add code
Bookmark button
Alert button
Dec 09, 2020
Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Yuval Elovici, Alexander Binder

Figure 1 for Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
Figure 2 for Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
Figure 3 for Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
Figure 4 for Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
Viaarxiv icon

Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks

Add code
Bookmark button
Alert button
Jan 07, 2020
Yi Xiang Marcus Tan, Yuval Elovici, Alexander Binder

Figure 1 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Figure 2 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Figure 3 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Figure 4 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Viaarxiv icon

Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics

Add code
Bookmark button
Alert button
May 28, 2019
Yi Xiang Marcus Tan, Alfonso Iacovazzi, Ivan Homoliak, Yuval Elovici, Alexander Binder

Figure 1 for Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
Figure 2 for Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
Figure 3 for Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
Figure 4 for Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
Viaarxiv icon