research
∙
04/05/2023
How to choose your best allies for a transferable attack?
The transferability of adversarial examples is a key issue in the securi...
research
∙
08/05/2022
FBI: Fingerprinting models with Benign Inputs
Recent advances in the fingerprinting of deep neural networks detect ins...
research
∙
04/28/2022
Randomized Smoothing under Attack: How Good is it in Pratice?
Randomized smoothing is a recent and celebrated solution to certify the ...
research
∙
02/10/2021
RoBIC: A benchmark suite for assessing classifiers robustness
Many defenses have emerged with the development of adversarial attacks. ...
research
∙
11/25/2020