Literature Database

Gradient-based adversarial attacks on categorical sequence models via traversing an embedded world

Authors: Ivan Fursov, Alexey Zaytsev, Nikita Kluchnikov, Andrey Kravchenko, Evgeny Burnaev | Published: 2020-03-09 | Updated: 2020-10-12
Adversarial Example
Adversarial attack
Generative Model

Security of Distributed Machine Learning: A Game-Theoretic Approach to Design Secure DSVM

Authors: Rui Zhang, Quanyan Zhu | Published: 2020-03-08 | Updated: 2020-04-26
Game Theory
Poisoning
Adversarial Attack Methods

Some Geometrical and Topological Properties of DNNs’ Decision Boundaries

Authors: Bo Liu, Mengya Shen | Published: 2020-03-07 | Updated: 2021-04-16
Robustness Evaluation
Mathematical Foundations
Fundamentals of Machine Learning

Dynamic Backdoor Attacks Against Machine Learning Models

Authors: Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang | Published: 2020-03-07 | Updated: 2022-03-03
Poisoning
Content Specialized for Toxicity Attacks
Defense Method

MAB-Malware: A Reinforcement Learning Framework for Attacking Static Malware Classifiers

Authors: Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, Heng Yin | Published: 2020-03-06 | Updated: 2021-04-29
Malware Classification
Malware Detection
Adversarial Perturbation Techniques

Forgetting Outside the Box: Scrubbing Deep Networks of Information Accessible from Input-Output Observations

Authors: Aditya Golatkar, Alessandro Achille, Stefano Soatto | Published: 2020-03-05 | Updated: 2020-10-29
Machine learning
Information Hiding Techniques
Deep Learning Method

Confusing and Detecting ML Adversarial Attacks with Injected Attractors

Authors: Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee | Published: 2020-03-05 | Updated: 2021-03-08
Adversarial Perturbation Techniques
Watermarking Technology
Defense Method

Denoised Smoothing: A Provable Defense for Pretrained Classifiers

Authors: Hadi Salman, Mingjie Sun, Greg Yang, Ashish Kapoor, J. Zico Kolter | Published: 2020-03-04 | Updated: 2020-09-21
Training Method
Robustness Evaluation
Defense Method

Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks

Authors: Francesco Croce, Matthias Hein | Published: 2020-03-03 | Updated: 2020-08-04
Robustness Evaluation
Adversarial Perturbation Techniques
Defense Method

Hidden Cost of Randomized Smoothing

Authors: Jeet Mohapatra, Ching-Yun Ko, Tsui-Wei, Weng, Sijia Liu, Pin-Yu Chen, Luca Daniel | Published: 2020-03-02 | Updated: 2021-03-12
Robustness Evaluation
Optimization Methods
Vulnerability Analysis