research
          
      
      ∙
      04/05/2023
    How to choose your best allies for a transferable attack?
The transferability of adversarial examples is a key issue in the securi...
          
            research
          
      
      ∙
      08/05/2022
    FBI: Fingerprinting models with Benign Inputs
Recent advances in the fingerprinting of deep neural networks detect ins...
          
            research
          
      
      ∙
      04/28/2022
    Randomized Smoothing under Attack: How Good is it in Pratice?
Randomized smoothing is a recent and celebrated solution to certify the ...
          
            research
          
      
      ∙
      02/10/2021
    RoBIC: A benchmark suite for assessing classifiers robustness
Many defenses have emerged with the development of adversarial attacks. ...
          
            research
          
      
      ∙
      11/25/2020
     
             
  
  
     
                             share
 share