From f2ac22aced49811345684f0a7766f42773c93a7e Mon Sep 17 00:00:00 2001 From: ysharma1126 Date: Fri, 15 Jun 2018 18:53:09 -0400 Subject: [PATCH] Update README.md --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 415ee14..9234bd6 100644 --- a/README.md +++ b/README.md @@ -16,13 +16,13 @@ by Yash Sharma\*, Pin-Yu Chen\*, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh (AAAI 201 The attack has also been used in the following works (incomplete): [Attacking the Madry Defense Model with L1-based Adversarial Examples](https://arxiv.org/abs/1710.10733) -by Yash Sharma\*, Pin-Yu Chen\* (ICLR 2018 Workshop) +by Yash Sharma, Pin-Yu Chen (ICLR 2018 Workshop) [Bypassing Feature Squeezing by Increasing Adversary Strength](https://arxiv.org/abs/1803.09868) -by Yash Sharma\*, Pin-Yu Chen\* +by Yash Sharma, Pin-Yu Chen [On the Limitation of MagNet Defense against L1-based Adversarial Examples](https://arxiv.org/abs/1805.00310) -by Pei-Hsuan Lu\*, Pin-Yu Chen\*, Kang-Cheng Chen\*, Chia-Mu Yu\* (IEEE/IFIP DSN 2018 Workshop) +by Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu (IEEE/IFIP DSN 2018 Workshop) The experiment code is based on Carlini and Wagner's L2 attack. The attack (with EN rule) can also be found in the [Cleverhans Repository](http://cleverhans.readthedocs.io/en/latest/_modules/cleverhans/attacks.html#ElasticNetMethod).