Picture for Jhe-Bang Ko

Jhe-Bang Ko

Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation

Add code
Nov 28, 2020
Figure 1 for Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation
Figure 2 for Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation
Figure 3 for Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation
Figure 4 for Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation
Viaarxiv icon