Literature Database

Weight Poisoning Attacks on Pre-trained Models

Authors: Keita Kurita, Paul Michel, Graham Neubig | Published: 2020-04-14
Backdoor Attack
Poisoning
Adversarial Learning

Extending Adversarial Attacks to Produce Adversarial Class Probability Distributions

Authors: Jon Vadillo, Roberto Santana, Jose A. Lozano | Published: 2020-04-14 | Updated: 2023-01-25
Robustness Evaluation
Adversarial Example
Adversarial Learning

Towards Robust Classification with Image Quality Assessment

Authors: Yeli Feng, Yiyu Cai | Published: 2020-04-14
Robustness
Adversarial Example
Deep Learning

DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments

Authors: Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Soteris Demetriou, Ilias Leontiadis, Andrea Cavallaro, Hamed Haddadi | Published: 2020-04-12
TEE Implementation
Privacy Issues
Computational Efficiency

PrivEdge: From Local to Distributed Private Training and Prediction

Authors: Ali Shahin Shamsabadi, Adria Gascon, Hamed Haddadi, Andrea Cavallaro | Published: 2020-04-12
Privacy Protection Method
Privacy Issues
Image Processing

Certifiable Robustness to Adversarial State Uncertainty in Deep Reinforcement Learning

Authors: Michael Everett, Bjorn Lutjens, Jonathan P. How | Published: 2020-04-11 | Updated: 2022-02-02
Multi-Agent Reinforcement Learning
Robustness
Deep Learning

Domain Adaptive Transfer Attack (DATA)-based Segmentation Networks for Building Extraction from Aerial Images

Authors: Younghwan Na, Jun Hee Kim, Kyungsu Lee, Juhum Park, Jae Youn Hwang, Jihwan P. Choi | Published: 2020-04-11 | Updated: 2020-04-29
Semantic Information Extraction
Generalization Performance
Adversarial Attack Methods

Machine Learning Based Solutions for Security of Internet of Things (IoT): A Survey

Authors: Syeda Manjia Tahsien, Hadis Karimipour, Petros Spachos | Published: 2020-04-11
Security Analysis
Attack Evaluation
Attack Detection

Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems

Authors: Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury | Published: 2020-04-10
Attack Evaluation
Attack Detection
Defense Method

Towards Federated Learning With Byzantine-Robust Client Weighting

Authors: Amit Portnoy, Yoav Tirosh, Danny Hendler | Published: 2020-04-10 | Updated: 2021-05-18
Poisoning
Robustness Improvement Method
Optimization Problem