Literature Database

Opportunities and Challenges in Deep Learning Adversarial Robustness: A Survey

Authors: Samuel Henrique Silva, Peyman Najafirad | Published: 2020-07-01 | Updated: 2020-07-03
Poisoning
Adversarial Example
Adversarial attack

Multi-Task Variational Information Bottleneck

Authors: Weizhu Qian, Bowei Chen, Yichao Zhang, Guanghui Wen, Franck Gechter | Published: 2020-07-01 | Updated: 2021-03-01
Algorithm Design
Generalization Performance
Machine Learning Method

A Le Cam Type Bound for Adversarial Learning and Applications

Authors: Qiuling Xu, Kevin Bello, Jean Honorio | Published: 2020-07-01 | Updated: 2021-02-10
Adversarial Example
Adversarial attack
Machine Learning Method

Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection

Authors: Deqiang Li, Qianmu Li | Published: 2020-06-30
Poisoning
Malware Evolution
Adversarial attack

Model-Targeted Poisoning Attacks with Provable Convergence

Authors: Fnu Suya, Saeed Mahloujifar, Anshuman Suri, David Evans, Yuan Tian | Published: 2020-06-30 | Updated: 2021-04-21
Backdoor Attack
Poisoning
Attack Scenario Analysis

Reducing Risk of Model Inversion Using Privacy-Guided Training

Authors: Abigail Goldsteen, Gilad Ezov, Ariel Farkash | Published: 2020-06-29
Privacy Leakage
Membership Inference
Model Inversion

FDA3 : Federated Defense Against Adversarial Attacks for Cloud-Based IIoT Applications

Authors: Yunfei Song, Tian Liu, Tongquan Wei, Xiangfeng Wang, Zhe Tao, Mingsong Chen | Published: 2020-06-28
Adversarial Example
Adversarial attack
Defense Mechanism

Understanding Gradient Clipping in Private SGD: A Geometric Perspective

Authors: Xiangyi Chen, Zhiwei Steven Wu, Mingyi Hong | Published: 2020-06-27 | Updated: 2021-03-18
Algorithm Design
Privacy Leakage
Optimization Methods

ATOM: Robustifying Out-of-distribution Detection Using Outlier Mining

Authors: Jiefeng Chen, Yixuan Li, Xi Wu, Yingyu Liang, Somesh Jha | Published: 2020-06-26 | Updated: 2021-06-30
Out-of-Distribution Detection
Adversarial Example Detection
Adversarial attack

Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?

Authors: Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu | Published: 2020-06-26 | Updated: 2022-07-28
Backdoor Attack
Adversarial Example Detection
Adversarial attack