Author of the publication

Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights.

, , , , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic Robustness Analysis for DNNs based on PAC Learning., , , , and . CoRR, (2021)Enhancing Robustness Verification for Deep Neural Networks via Symbolic Propagation., , , , , , , and . Formal Aspects Comput., 33 (3): 407-435 (2021)Towards Practical Robustness Analysis for DNNs based on PAC-Model Learning., , , , , and . ICSE, page 2189-2201. ACM, (2022)Ensemble Defense with Data Diversity: Weak Correlation Implies Strong Robustness., , , , , , and . CoRR, (2021)Improving Neural Network Verification through Spurious Region Guided Refinement., , , , , , , and . CoRR, (2020)ADVREPAIR: Provable Repair of Adversarial Attack., , , , , , and . CoRR, (2024)Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights., , , , , , , and . CoRR, (2023)Reach-avoid Analysis for Stochastic Discrete-time Systems., , , and . ACC, page 4879-4885. IEEE, (2021)PRODeep: a platform for robustness verification of deep neural networks., , , , , , , and . ESEC/SIGSOFT FSE, page 1630-1634. ACM, (2020)Towards Good Practices in Evaluating Transfer Adversarial Attacks., , , , , and . CoRR, (2022)