Login / Signup
Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data.
Thibault Simonetto
Salah Ghamizi
Antoine Desjardins
Maxime Cordy
Yves Le Traon
Published in:
CoRR (2023)
Keyphrases
</>
tabular data
neural network
training process
cell suppression
supervised learning
databases
data mining techniques
statistical disclosure control
controlled tabular adjustment
query expansion
watermarking technique