AdversarialNonnegativeMatrixFactorizationLeiLuo12YanfuZhang2HengHuang12AbstractSinceNMFwaspopularizedbyLeeandSeung(Lee&Seung,1999),variousNMFmethodshavebeenproposed.NonnegativeMatrixFactorization(N...
AdversarialMutualInformationforTextGenerationBoyuanPan1YazhengYang2KaizhaoLiang3BhavyaKailkhura4ZhongmingJin5Xian-ShengHua5DengCai1BoLi3Abstractdemonstrateddominantperformanceinvarioustasks,suchasd...
AdversarialLearningGuaranteesforLinearHypothesesandNeuralNetworksPranjalAwasthi1NatalieS.Frank2MehryarMohri3Abstractetal.,2018;2019;Schottetal.,2018)andworksaimedatdesigningmoresophisticatedattacks...
AdversarialFiltersofDatasetBiasesRonanLeBras1SwabhaSwayamdipta1ChandraBhagavatula1RowanZellers12MatthewE.Peters1AshishSabharwal1YejinChoi12Abstractwild”(Eykholtetal.,2018;Jia&Liang,2017).Thisphe-n...
AdversarialAttacksonProbabilisticAutoregressiveForecastingModelsRaphae¨lDang-Nhu1GagandeepSingh1PavolBielik1MartinVechev1Abstractsinglebestvaluehasseveraladvantages–itnaturallyfitstheinherentlyst...
AdversarialAttacksonCopyrightDetectionSystemsParsaSaadatpanah1AliShafahi1TomGoldstein1Abstractdetectionextractfeatures,calledfingerprints,fromsam-pledvideooraudio,andthenmatchthesefeatureswithaItis...
AdaptiveAdversarialMulti-taskRepresentationLearningYurenMao1WeiweiLiu2XueminLin1Abstractrestrictthehypothesisclassbyenforcingallthetaskstoshareanidenticaldistributionintherepresentationspace.Advers...
TransferableAdversarialTraining:AGeneralApproachtoAdaptingDeepClassifiersHongLiu12MingshengLong13JianminWang13MichaelI.Jordan4AbstractFigure1.Anoverviewofourapproach.(a)Amodeltrainedonlyonthesource...
SimpleBlack-boxAdversarialAttacksChuanGuo1JacobR.Gardner2YurongYou1AndrewGordonWilson1KilianQ.Weinberger1Abstractwhereasblack-boxattacksrequireonlyqueriestothetargetmodelthatmayreturncompleteorpart...
Self-AttentionGenerativeAdversarialNetworksHanZhang12IanGoodfellow2DimitrisMetaxas1AugustusOdena2AbstractlutionalGANs(Odenaetal.,2017;Miyatoetal.,2018;Miyato&Koyama,2018)havemuchmoredifficultyinInt...
RobustDecisionTreesAgainstAdversarialExamplesHonggeChen1HuanZhang2DuaneBoning1Cho-JuiHsieh2Abstracttherobustnessoftree-basedmodelsarequitelimited(Paper-notetal.,2016a).AlthoughAdversarialexamplesan...
ParsimoniousBlack-BoxAdversarialAttacksviaEfficientCombinatorialOptimizationSeungyongMoon12GaonAn12HyunOhSong12AbstractHowever,inmorerealisticsettings(Watsonvisualrecogni-tion,2019;GooglevisionAPI,...
OnlineConvexOptimizationinAdversarialMarkovDecisionProcessesAvivRosenberg1YishayMansour12AbstractWeproposeanovelalgorithmfortheAdversarialMDPmodelwherethetransitionfunctionisunknowntotheWeconsidero...
OnlineControlwithAdversarialDisturbancesNamanAgarwal1BrianBullins21EladHazan21ShamM.Kakade341KaranSingh21AbstractChallenge1.Perhapsthemostimportantchallengeweaddressisindealingwitharbitrarydisturba...
OntheConvergenceandRobustnessofAdversarialTrainingYisenWang1XingjunMa2JamesBailey2JinfengYi1BowenZhou1QuanquanGu3Abstract2018),theyarevulnerabletoAdversarialexamplescraftedbyaddingsmall,humanimperc...
OntheConnectionBetweenAdversarialRobustnessandSaliencyMapInterpretabilityChristianEtmann12SebastianLunz3PeterMaass1Carola-BibianeScho¨nlieb3AbstractFigure1.Animageofadog(left),thesaliencymapsofahi...
OnCertifyingNon-uniformBoundsagainstAdversarialAttacksChenLiu1RyotaTomioka2VolkanCevher1AbstractCWattack(Carlini&Wagner,2017).MostattackmethodssearchfortheAdversarialexamplebyutilizingthegradientTh...
Non-ParametricPriorsForGenerativeAdversarialNetworksRajhansSingh1PavanTuraga12SurenJayasuriya12RaviGarg3MartinW.Braun3Abstractpointsinhigh-dimensionalspacewithdistributionsmatch-ingreal-data.Inpart...
NATTACK:LearningtheDistributionsofAdversarialExamplesforanImprovedBlack-BoxAttackonDeepNeuralNetworksYandongLi1LijunLi1LiqiangWang1TongZhang2BoqingGong3Abstracttacklingdifferentdefenses.Hence,itmay...
Multivariate-InformationAdversarialEnsembleforScalableJointDistributionMatchingZiliangChen1ZhanfuYang2XiaoxiWang1XiaodanLiang1XiaopengYan1GuanbinLi1LiangLin1Abstract(∀j∈[m],j=i)tosatisfytheequati...