Literature Database

Uncertainty-Matching Graph Neural Networks to Defend Against Poisoning Attacks

Authors: Uday Shankar Shanthamallu, Jayaraman J. Thiagarajan, Andreas Spanias | Published: 2020-09-30
Graph Neural Network
Poisoning
Content Specialized for Toxicity Attacks

StratLearner: Learning a Strategy for Misinformation Prevention in Social Networks

Authors: Guangmo Tong | Published: 2020-09-29
Graph Construction
Information Extraction
Optimization Methods

SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud

Authors: Shaza Zeitouni, Ghada Dessouky, Ahmad-Reza Sadeghi | Published: 2020-09-29 | Updated: 2020-10-05
FPGA Security
Malicious Client
Computational Efficiency

Learning to Generate Image Source-Agnostic Universal Adversarial Perturbations

Authors: Pu Zhao, Parikshit Ram, Songtao Lu, Yuguang Yao, Djallel Bouneffouf, Xue Lin, Sijia Liu | Published: 2020-09-29 | Updated: 2022-08-17
Few-Shot Learning
Task Adaptation Method
Optimization Methods

Information Obfuscation of Graph Neural Networks

Authors: Peiyuan Liao, Han Zhao, Keyulu Xu, Tommi Jaakkola, Geoffrey Gordon, Stefanie Jegelka, Ruslan Salakhutdinov | Published: 2020-09-28 | Updated: 2021-06-13
Game Theory
Information-Theoretic Privacy
Optimization Strategy

Generating End-to-End Adversarial Examples for Malware Classifiers Using Explainability

Authors: Ishai Rosenberg, Shai Meir, Jonathan Berrebi, Ilay Gordon, Guillaume Sicard, Eli David | Published: 2020-09-28 | Updated: 2022-06-01
Malware Classification
Model Interpretability
Adversarial Example

Adversarial Robustness of Stabilized NeuralODEs Might be from Obfuscated Gradients

Authors: Yifei Huang, Yaodong Yu, Hongyang Zhang, Yi Ma, Yuan Yao | Published: 2020-09-28 | Updated: 2021-06-02
Poisoning
Relationship between Robustness and Privacy
Deep Learning

A Robust graph attention network with dynamic adjusted Graph

Authors: Xianchen Zhou, Yaoyun Zeng, Hongxia Wang | Published: 2020-09-28 | Updated: 2022-08-04
Graph Transformation
Poisoning
Relationship between Robustness and Privacy

Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence

Authors: Chang Liao, Yao Cheng, Chengfang Fang, Jie Shi | Published: 2020-09-28 | Updated: 2020-10-08
Relationship between Robustness and Privacy
Vulnerability of Adversarial Examples
Research Methodology

Beneficial Perturbations Network for Defending Adversarial Examples

Authors: Shixian Wen, Amanda Rios, Laurent Itti | Published: 2020-09-27 | Updated: 2021-09-13
Adversarial Example
Vulnerability of Adversarial Examples
Deep Learning