A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
GraCIAS: Grassmannian of Corrupted Images for Adversarial Security
[article]
2020
arXiv
pre-print
Input transformation based defense strategies fall short in defending against strong adversarial attacks. Some successful defenses adopt approaches that either increase the randomness within the applied transformations, or make the defense computationally intensive, making it substantially more challenging for the attacker. However, it limits the applicability of such defenses as a pre-processing step, similar to computationally heavy approaches that use retraining and network modifications to
arXiv:2005.02936v2
fatcat:2ofcn2r23bavtcin2xsxkzphey