Search Results for author: Rakesh B. Bobba

Found 5 papers, 0 papers with code

Adversarial Profiles: Detecting Out-Distribution & Adversarial Samples in Pre-trained CNNs

no code implementations18 Nov 2020 Arezoo Rajabi, Rakesh B. Bobba

Here, we propose a method to detect adversarial and out-distribution examples against a pre-trained CNN without needing to retrain the CNN or needing access to a wide variety of fooling examples.

Adversarial Attack

Toward Adversarial Robustness by Diversity in an Ensemble of Specialized Deep Neural Networks

no code implementations17 May 2020 Mahdieh Abbasi, Arezoo Rajabi, Christian Gagne, Rakesh B. Bobba

Using MNIST and CIFAR-10, we empirically verify the ability of our ensemble to detect a large portion of well-known black-box adversarial examples, which leads to a significant reduction in the risk rate of adversaries, at the expense of a small increase in the risk rate of clean samples.

Adversarial Robustness

Controlling Over-generalization and its Effect on Adversarial Examples Detection and Generation

no code implementations ICLR 2019 Mahdieh Abbasi, Arezoo Rajabi, Azadeh Sadat Mozafari, Rakesh B. Bobba, Christian Gagné

As an appropriate training set for the extra class, we introduce two resources that are computationally efficient to obtain: a representative natural out-distribution set and interpolated in-distribution samples.

Controlling Over-generalization and its Effect on Adversarial Examples Generation and Detection

no code implementations21 Aug 2018 Mahdieh Abbasi, Arezoo Rajabi, Azadeh Sadat Mozafari, Rakesh B. Bobba, Christian Gagne

As an appropriate training set for the extra class, we introduce two resources that are computationally efficient to obtain: a representative natural out-distribution set and interpolated in-distribution samples.

Towards Dependable Deep Convolutional Neural Networks (CNNs) with Out-distribution Learning

no code implementations24 Apr 2018 Mahdieh Abbasi, Arezoo Rajabi, Christian Gagné, Rakesh B. Bobba

Detection and rejection of adversarial examples in security sensitive and safety-critical systems using deep CNNs is essential.

Cannot find the paper you are looking for? You can Submit a new open access paper.