This report details the design, development, and implementation of
Incid...
Test-time adversarial attacks have posed serious challenges to the robus...
Adversarial examples have received a great deal of recent attention beca...
We consider data poisoning attacks, where an adversary can modify a smal...
We consider data poisoning attacks, a class of adversarial attacks on ma...
Motivated by applications such as autonomous vehicles, test-time attacks...
Many modern databases include personal and sensitive correlated data, su...