Dynamic Backdoor Attacks Against Machine Learning Models Authors: Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang | Published: 2020-03-07 | Updated: 2022-03-03 PoisoningContent Specialized for Toxicity AttacksDefense Method 2020.03.07 2025.05.28 Literature Database
MAB-Malware: A Reinforcement Learning Framework for Attacking Static Malware Classifiers Authors: Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, Heng Yin | Published: 2020-03-06 | Updated: 2021-04-29 Malware ClassificationMalware DetectionAdversarial Perturbation Techniques 2020.03.06 2025.05.28 Literature Database
Forgetting Outside the Box: Scrubbing Deep Networks of Information Accessible from Input-Output Observations Authors: Aditya Golatkar, Alessandro Achille, Stefano Soatto | Published: 2020-03-05 | Updated: 2020-10-29 Machine learningInformation Hiding TechniquesDeep Learning Method 2020.03.05 2025.05.28 Literature Database
Confusing and Detecting ML Adversarial Attacks with Injected Attractors Authors: Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee | Published: 2020-03-05 | Updated: 2021-03-08 Adversarial Perturbation TechniquesWatermarking TechnologyDefense Method 2020.03.05 2025.05.28 Literature Database
Denoised Smoothing: A Provable Defense for Pretrained Classifiers Authors: Hadi Salman, Mingjie Sun, Greg Yang, Ashish Kapoor, J. Zico Kolter | Published: 2020-03-04 | Updated: 2020-09-21 Training MethodRobustness EvaluationDefense Method 2020.03.04 2025.05.28 Literature Database
Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks Authors: Francesco Croce, Matthias Hein | Published: 2020-03-03 | Updated: 2020-08-04 Robustness EvaluationAdversarial Perturbation TechniquesDefense Method 2020.03.03 2025.05.28 Literature Database
Hidden Cost of Randomized Smoothing Authors: Jeet Mohapatra, Ching-Yun Ko, Tsui-Wei, Weng, Sijia Liu, Pin-Yu Chen, Luca Daniel | Published: 2020-03-02 | Updated: 2021-03-12 Robustness EvaluationOptimization MethodsVulnerability Analysis 2020.03.02 2025.05.28 Literature Database
Bayesian Neural Networks With Maximum Mean Discrepancy Regularization Authors: Jary Pomponi, Simone Scardapane, Aurelio Uncini | Published: 2020-03-02 | Updated: 2020-09-30 Training MethodUncertainty MeasurementOptimization Methods 2020.03.02 2025.05.28 Literature Database
Buffered Asynchronous SGD for Byzantine Learning Authors: Yi-Rui Yang, Wu-Jun Li | Published: 2020-03-02 | Updated: 2022-01-31 Training MethodConvergence AnalysisPerformance Evaluation Metrics 2020.03.02 2025.05.28 Literature Database
Adversarial Attacks and Defenses on Graphs: A Review, A Tool and Empirical Studies Authors: Wei Jin, Yaxin Li, Han Xu, Yiqi Wang, Shuiwang Ji, Charu Aggarwal, Jiliang Tang | Published: 2020-03-02 | Updated: 2020-12-12 PoisoningAdversarial ExampleAdversarial Learning 2020.03.02 2025.05.28 Literature Database