no code implementations • ICML 2020 • Yi-Hsuan Wu, Chia-Hung Yuan, Shan-Hung (Brandon) Wu
Deep neural networks are shown to be vulnerable to adversarial attacks.
no code implementations • AAAI Workshop AdvML 2022 • Chia-Hung Yuan, Pin-Yu Chen, Chia-Mu Yu
A plethora of attack methods have been proposed to generate adversarial examples, among which the iterative methods have been demonstrated the ability to find a strong attack.