Literature Database

Evaluating Adversarial Attacks on ImageNet: A Reality Check on Misclassification Classes

Authors: Utku Ozbulak, Maura Pintor, Arnout Van Messem, Wesley De Neve | Published: 2021-11-22
Poisoning
Adversarial Example
Adversarial attack

Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Model

Authors: Alon Zolfi, Shai Avidan, Yuval Elovici, Asaf Shabtai | Published: 2021-11-21 | Updated: 2022-09-07
Impact of Generalization
Adversarial attack
Face Recognition System

Understanding Training-Data Leakage from Gradients in Neural Networks for Image Classification

Authors: Cangxiong Chen, Neill D. F. Campbell | Published: 2021-11-19
Training Data Extraction Method
Reconstruction Attack
Defense Mechanism

Fooling Adversarial Training with Inducing Noise

Authors: Zhirui Wang, Yifei Wang, Yisen Wang | Published: 2021-11-19
Training Data Generation
Poisoning
Adversarial attack

A Review of Adversarial Attack and Defense for Classification Methods

Authors: Yao Li, Minhao Cheng, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-11-18
Adversarial Example
Adversarial attack
Defense Mechanism

Enhanced Membership Inference Attacks against Machine Learning Models

Authors: Jiayuan Ye, Aadyaa Maddi, Sasi Kumar Murakonda, Vincent Bindschaedler, Reza Shokri | Published: 2021-11-18 | Updated: 2022-09-13
Poisoning
Membership Inference
Adversarial attack

Enhancing the Insertion of NOP Instructions to Obfuscate Malware via Deep Reinforcement Learning

Authors: Daniel Gibert, Matt Fredrikson, Carles Mateu, Jordi Planes, Quan Le | Published: 2021-11-18
Malware Detection Method
Reinforcement Learning
Deep Reinforcement Learning

InspectJS: Leveraging Code Similarity and User-Feedback for Effective Taint Specification Inference for JavaScript

Authors: Saikat Dutta, Diego Garbervetsky, Shuvendu Lahiri, Max Schäfer | Published: 2021-11-18
Website Vulnerability
Program Analysis
Static Analysis

Facial Information Analysis Technology for Gender and Age Estimation

Authors: Gilheum Park, Sua Jung | Published: 2021-11-17
Algorithm
Machine Learning
Attack that Analyzes Images with AI to Infer Personal Information

Fast Yet Effective Machine Unlearning

Authors: Ayush K Tarun, Vikram S Chundawat, Murari Mandal, Mohan Kankanhalli | Published: 2021-11-17 | Updated: 2023-05-31
Machine learning
Model Evaluation
Robustness Evaluation