Towards Practical Robustness Evaluation and Robustness Enhancing
Abstract
Supplementary Material
- Download
- 91.39 MB
References
Index Terms
- Towards Practical Robustness Evaluation and Robustness Enhancing
Recommendations
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models against Adversarial Attacks
Benefiting from the rapid development of deep learning, 2D and 3D computer vision applications are deployed in many safe-critical systems, such as autopilot and identity authentication. However, deep learning models are not trustworthy enough because of ...
Adversarial Robustness of Deep Code Comment Generation
Deep neural networks (DNNs) have shown remarkable performance in a variety of domains such as computer vision, speech recognition, and natural language processing. Recently they also have been applied to various software engineering tasks, typically ...
Adversarial Robustness in Deep Learning: From Practices to Theories
KDD '21: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data MiningDeep neural networks (DNNs) have achieved unprecedented accomplishments in various machine learning tasks. However, recent studies demonstrate that DNNs are extremely vulnerable to adversarial examples. They are manually synthesized input samples which ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/7c5dcf1c-6ad2-4a71-8d3a-e0206cc1373d/3488560.cover.jpg)
- General Chairs:
- K. Selcuk Candan,
- Huan Liu,
- Program Chairs:
- Leman Akoglu,
- Xin Luna Dong,
- Jiliang Tang
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Extended-abstract
Funding Sources
- Army Research Office (ARO)
- National Science Foundation (NSF)
Conference
Acceptance Rates
Upcoming Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 108Total Downloads
- Downloads (Last 12 months)12
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in