Deep Neural Networks are susceptible to adversarial perturbations. Adversarial training and adversarial purification are among the most widely recognized defense strategies. Although these methods have different underlying logic, both rely on absolute logit values to generate label predictions. In this study, we theoretically analyze the logit difference around successful adversarial attacks from a theoretical point of view and propose a new principle, namely Adversarial Logit Update (ALU), to infer adversarial sample's labels. Based on ALU, we introduce a new classification paradigm that utilizes pre- and post-purification logit differences for model's adversarial robustness boost. Without requiring adversarial or additional data for model...
The vulnerabilities of deep neural networks against adversarial examples have become a significant c...
Deep Convolution Neural Networks (CNNs) can easily be fooled by subtle, imperceptible changes to the...
Machine Learning algorithms provide astonishing performance in a wide range of tasks, including sens...
Detecting adversarial examples currently stands as one of the biggest challenges in the field of dee...
This electronic version was submitted by the student author. The certified thesis is available in th...
Image classification systems are known to be vulnerable to adversarial attacks, which are impercepti...
Deep learning plays an important role in various disciplines, such as auto-driving, information tech...
Neural networks are vulnerable to adversarial attacks - small visually imperceptible crafted noise w...
Recently, Kannan et al. [2018] proposed several logit regularization methods to improve the adversar...
Neural networks provide state-of-the-art results for most machine learning tasks. Unfortunately, neu...
Adversarial training is the standard to train models robust against adversarial examples. However, e...
Deep learning has seen tremendous growth, largely fueled by more powerful computers, the availabilit...
Deep neural networks have achieved remarkable performance in various applications but are extremely ...
From simple time series forecasting to computer security and autonomous systems, machine learning (M...
Due to numerous breakthroughs in real-world applications brought by machine intelligence, deep neura...
The vulnerabilities of deep neural networks against adversarial examples have become a significant c...
Deep Convolution Neural Networks (CNNs) can easily be fooled by subtle, imperceptible changes to the...
Machine Learning algorithms provide astonishing performance in a wide range of tasks, including sens...
Detecting adversarial examples currently stands as one of the biggest challenges in the field of dee...
This electronic version was submitted by the student author. The certified thesis is available in th...
Image classification systems are known to be vulnerable to adversarial attacks, which are impercepti...
Deep learning plays an important role in various disciplines, such as auto-driving, information tech...
Neural networks are vulnerable to adversarial attacks - small visually imperceptible crafted noise w...
Recently, Kannan et al. [2018] proposed several logit regularization methods to improve the adversar...
Neural networks provide state-of-the-art results for most machine learning tasks. Unfortunately, neu...
Adversarial training is the standard to train models robust against adversarial examples. However, e...
Deep learning has seen tremendous growth, largely fueled by more powerful computers, the availabilit...
Deep neural networks have achieved remarkable performance in various applications but are extremely ...
From simple time series forecasting to computer security and autonomous systems, machine learning (M...
Due to numerous breakthroughs in real-world applications brought by machine intelligence, deep neura...
The vulnerabilities of deep neural networks against adversarial examples have become a significant c...
Deep Convolution Neural Networks (CNNs) can easily be fooled by subtle, imperceptible changes to the...
Machine Learning algorithms provide astonishing performance in a wide range of tasks, including sens...