Matthias Schott

Papers in Database (1)

attack arXiv Mar 14, 2026 · 23d ago

Shapes are not enough: CONSERVAttack and its use for finding vulnerabilities and uncertainties in machine learning applications

Philip Bechtle, Lucie Flek, Philipp Alexander Jung et al. · University of Bonn · RWTH Aachen University

Adversarial attack crafting physically-plausible perturbations that evade standard validation checks in particle physics ML models

Input Manipulation Attack tabular
PDF