Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
DeepFool - MaRDI portal

DeepFool

From MaRDI portal
Software:32750



swMATH20937MaRDI QIDQ32750


No author found.

Source code repository: https://github.com/lts4/deepfool




Related Items (23)

A robust generative classifier against transfer attacks based on variational auto-encodersBlack-box adversarial attacks by manipulating image attributesActive Subspace of Neural Networks: Structural Analysis and Universal AttacksStronger data poisoning attacks break data sanitization defensesAchieving adversarial robustness via sparsityDiffRNN: differential verification of recurrent neural networksAnalysis of classifiers' robustness to adversarial perturbationsScale-invariant scale-channel networks: deep networks that generalise to previously unseen scalesAchieving Adversarial Robustness Requires An Active TeacherGenerating universal adversarial perturbation with ResNetScaling up the randomized gradient-free adversarial attack reveals overestimation of robustness using established attacksAdversarial classification via distributional robustness with Wasserstein ambiguity\textsc{Treant}: training evasion-aware decision treesSyReNN: a tool for analyzing deep neural networksVerification of piecewise deep neural networks: a star set approach with zonotope pre-filterA survey of safety and trustworthiness of deep neural networks: verification, testing, adversarial attack and defence, and interpretabilityDeep learning as optimal control problems: models and numerical methodsEnhancing robustness verification for deep neural networks via symbolic propagationMimicGAN: robust projection onto image manifolds with corruption mimickingQuantized convolutional neural networks through the lens of partial differential equationsThe Gap between Theory and Practice in Function Approximation with Deep Neural NetworksCompositional falsification of cyber-physical systems with machine learning componentsDetecting Scene-Plausible Perceptible Backdoors in Trained DNNs Without Access to the Training Set


This page was built for software: DeepFool