Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks Authors: Ali Shafahi, W. Ronny Huang, Mahyar Najibi, Octavian Suciu, Christoph Studer, Tudor Dumitras, Tom Goldstein | Published: 2018-04-03 | Updated: 2018-11-10 2018.04.03 2025.05.28 Literature Database
Resilient Non-Submodular Maximization over Matroid Constraints Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-04-02 | Updated: 2018-12-06 2018.04.02 2025.05.28 Literature Database
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning Authors: Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li | Published: 2018-04-01 | Updated: 2021-09-28 2018.04.01 2025.05.28 Literature Database
Adversarial Attacks and Defences Competition Authors: Alexey Kurakin, Ian Goodfellow, Samy Bengio, Yinpeng Dong, Fangzhou Liao, Ming Liang, Tianyu Pang, Jun Zhu, Xiaolin Hu, Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, Alan Yuille, Sangxia Huang, Yao Zhao, Yuzhe Zhao, Zhonglin Han, Junjiajia Long, Yerkebulan Berdibekov, Takuya Akiba, Seiya Tokui, Motoki Abe | Published: 2018-03-31 2018.03.31 2025.05.28 Literature Database
Two-Stream Neural Networks for Tampered Face Detection Authors: Peng Zhou, Xintong Han, Vlad I. Morariu, Larry S. Davis | Published: 2018-03-29 2018.03.29 2025.05.28 Literature Database
Protection against Cloning for Deep Learning Authors: Richard Kenway | Published: 2018-03-29 2018.03.29 2025.05.28 Literature Database
Defending against Adversarial Images using Basis Functions Transformations Authors: Uri Shaham, James Garritano, Yutaro Yamada, Ethan Weinberger, Alex Cloninger, Xiuyuan Cheng, Kelly Stanton, Yuval Kluger | Published: 2018-03-28 | Updated: 2018-04-16 2018.03.28 2025.05.28 Literature Database
You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information Authors: Beatrice Perez, Mirco Musolesi, Gianluca Stringhini | Published: 2018-03-27 | Updated: 2018-05-14 2018.03.27 2025.05.28 Literature Database
Privacy Preserving Machine Learning: Threats and Solutions Authors: Mohammad Al-Rubaie, J. Morris Chang | Published: 2018-03-27 2018.03.27 2025.05.28 Literature Database
Hiding in the Crowd: A Massively Distributed Algorithm for Private Averaging with Malicious Adversaries Authors: Pierre Dellenbach, Aurélien Bellet, Jan Ramon | Published: 2018-03-27 2018.03.27 2025.05.28 Literature Database