Mitigating adversarial effects through randomization

C Xie, J Wang, Z Zhang, Z Ren, A Yuille - arXiv preprint arXiv:1711.01991, 2017 - arxiv.org
Convolutional neural networks have demonstrated high accuracy on various tasks in recent
years. However, they are extremely vulnerable to adversarial examples. For example …

[PDF][PDF] MITIGATING ADVERSARIAL EFFECTS THROUGH RAN

C Xie, Z Zhang, AL Yuille, J Wang, Z Ren - cs.jhu.edu
Convolutional neural networks have demonstrated high accuracy on various tasks in recent
years. However, they are extremely vulnerable to adversarial examples. For example …

Mitigating Adversarial Effects Through Randomization

C Xie, J Wang, Z Zhang, Z Ren, A Yuille - arXiv e-prints, 2017 - ui.adsabs.harvard.edu
Convolutional neural networks have demonstrated high accuracy on various tasks in recent
years. However, they are extremely vulnerable to adversarial examples. For example …

Mitigating Adversarial Effects Through Randomization

C Xie, J Wang, Z Zhang, Z Ren, A Yuille - cihangxie.github.io
Let x denote the input image; Let f denote the a classifier, eg, a neural network; Let l denote
the adversarial label, ie, f (x)≠ l To find the adversarial perturbation r, we can solve the …

[PDF][PDF] MITIGATING ADVERSARIAL EFFECTS THROUGH RAN

C Xie, Z Zhang, AL Yuille, J Wang… - arXiv preprint arXiv …, 2017 - researchgate.net
Convolutional neural networks have demonstrated high accuracy on various tasks in recent
years. However, they are extremely vulnerable to adversarial examples. For example …

Mitigating Adversarial Effects Through Randomization

C Xie, J Wang, Z Zhang, Z Ren… - … Conference on Learning …, 2018 - openreview.net
Convolutional neural networks have demonstrated high accuracy on various tasks in recent
years. However, they are extremely vulnerable to adversarial examples. For example …

Mitigating Adversarial Effects Through Randomization

C Xie, J Wang, Z Zhang, Z Ren… - … Conference on Learning …, 2018 - openreview.net
Convolutional neural networks have demonstrated high accuracy on various tasks in recent
years. However, they are extremely vulnerable to adversarial examples. For example …