Alert button
Picture for Dou Goodman

Dou Goodman

Alert button

Attacking and Defending Machine Learning Applications of Public Cloud

Add code
Bookmark button
Alert button
Jul 27, 2020
Dou Goodman, Hao Xin

Figure 1 for Attacking and Defending Machine Learning Applications of Public Cloud
Figure 2 for Attacking and Defending Machine Learning Applications of Public Cloud
Figure 3 for Attacking and Defending Machine Learning Applications of Public Cloud
Figure 4 for Attacking and Defending Machine Learning Applications of Public Cloud
Viaarxiv icon

Advbox: a toolbox to generate adversarial examples that fool neural networks

Add code
Bookmark button
Alert button
Feb 21, 2020
Dou Goodman, Hao Xin, Wang Yang, Wu Yuesheng, Xiong Junfeng, Zhang Huan

Figure 1 for Advbox: a toolbox to generate adversarial examples that fool neural networks
Figure 2 for Advbox: a toolbox to generate adversarial examples that fool neural networks
Figure 3 for Advbox: a toolbox to generate adversarial examples that fool neural networks
Figure 4 for Advbox: a toolbox to generate adversarial examples that fool neural networks
Viaarxiv icon

FastWordBug: A Fast Method To Generate Adversarial Text Against NLP Applications

Add code
Bookmark button
Alert button
Jan 31, 2020
Dou Goodman, Lv Zhonghou, Wang minghua

Figure 1 for FastWordBug: A Fast Method To Generate Adversarial Text Against NLP Applications
Figure 2 for FastWordBug: A Fast Method To Generate Adversarial Text Against NLP Applications
Figure 3 for FastWordBug: A Fast Method To Generate Adversarial Text Against NLP Applications
Figure 4 for FastWordBug: A Fast Method To Generate Adversarial Text Against NLP Applications
Viaarxiv icon

Transferability of Adversarial Examples to Attack Cloud-based Image Classifier Service

Add code
Bookmark button
Alert button
Jan 20, 2020
Dou Goodman

Figure 1 for Transferability of Adversarial Examples to Attack Cloud-based Image Classifier Service
Figure 2 for Transferability of Adversarial Examples to Attack Cloud-based Image Classifier Service
Figure 3 for Transferability of Adversarial Examples to Attack Cloud-based Image Classifier Service
Figure 4 for Transferability of Adversarial Examples to Attack Cloud-based Image Classifier Service
Viaarxiv icon

Cloud-based Image Classification Service Is Not Robust To Adversarial Examples: A Forgotten Battlefield

Add code
Bookmark button
Alert button
Jan 08, 2020
Dou Goodman

Figure 1 for Cloud-based Image Classification Service Is Not Robust To Adversarial Examples: A Forgotten Battlefield
Figure 2 for Cloud-based Image Classification Service Is Not Robust To Adversarial Examples: A Forgotten Battlefield
Figure 3 for Cloud-based Image Classification Service Is Not Robust To Adversarial Examples: A Forgotten Battlefield
Figure 4 for Cloud-based Image Classification Service Is Not Robust To Adversarial Examples: A Forgotten Battlefield
Viaarxiv icon

Improving Adversarial Robustness via Attention and Adversarial Logit Pairing

Add code
Bookmark button
Alert button
Aug 23, 2019
Dou Goodman, Xingjian Li, Jun Huan, Tao Wei

Figure 1 for Improving Adversarial Robustness via Attention and Adversarial Logit Pairing
Figure 2 for Improving Adversarial Robustness via Attention and Adversarial Logit Pairing
Figure 3 for Improving Adversarial Robustness via Attention and Adversarial Logit Pairing
Figure 4 for Improving Adversarial Robustness via Attention and Adversarial Logit Pairing
Viaarxiv icon