Picture for Yi Xiang Marcus Tan

Yi Xiang Marcus Tan

Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples

Add code
Oct 24, 2021
Figure 1 for Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples
Figure 2 for Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples
Figure 3 for Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples
Figure 4 for Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples
Viaarxiv icon

Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity

Add code
Dec 09, 2020
Figure 1 for Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
Figure 2 for Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
Figure 3 for Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
Figure 4 for Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
Viaarxiv icon

Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks

Add code
Jan 07, 2020
Figure 1 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Figure 2 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Figure 3 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Figure 4 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Viaarxiv icon

Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics

Add code
May 28, 2019
Figure 1 for Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
Figure 2 for Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
Figure 3 for Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
Figure 4 for Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
Viaarxiv icon