Literature Database

Towards Certifiable Adversarial Sample Detection

Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2020-02-20
Adversarial Example
Regularization
Defense Method

Boosting Adversarial Training with Hypersphere Embedding

Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Kun Xu, Jun Zhu, Hang Su | Published: 2020-02-20 | Updated: 2020-11-25
Training Method
Effective Perturbation Methods
Adversarial Training

Data Heterogeneity Differential Privacy: From Theory to Algorithm

Authors: Yilin Kang, Jian Li, Yong Liu, Weiping Wang | Published: 2020-02-20 | Updated: 2023-01-28
DP-SGD
Privacy-Preserving Algorithm
Loss Function

On Adaptive Attacks to Adversarial Example Defenses

Authors: Florian Tramer, Nicholas Carlini, Wieland Brendel, Aleksander Madry | Published: 2020-02-19 | Updated: 2020-10-23
Robustness Evaluation
Adversarial Example
Defense Method

Variational Encoder-based Reliable Classification

Authors: Chitresh Bhushan, Zhaoyuan Yang, Nurali Virani, Naresh Iyer | Published: 2020-02-19 | Updated: 2020-10-17
Training Method
Robustness Evaluation
Adversarial Attack Detection

Randomized Smoothing of All Shapes and Sizes

Authors: Greg Yang, Tony Duan, J. Edward Hu, Hadi Salman, Ilya Razenshteyn, Jerry Li | Published: 2020-02-19 | Updated: 2020-07-23
Training Method
Robustness Evaluation
Definition of Mathematical Concepts

Influence Function based Data Poisoning Attacks to Top-N Recommender Systems

Authors: Minghong Fang, Neil Zhenqiang Gong, Jia Liu | Published: 2020-02-19 | Updated: 2020-05-31
Poisoning
Maximum Coverage Problem
Threat modeling

Indirect Adversarial Attacks via Poisoning Neighbors for Graph Convolutional Networks

Authors: Tsubasa Takahashi | Published: 2020-02-19
Graph Neural Network
Adversarial Example
Adversarial Attack Detection

Detection and Analysis of Drive-by Downloads and Malicious Websites

Authors: Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi | Published: 2020-02-19 | Updated: 2020-04-09
Malware Detection
Information Security
Feature Extraction Method

Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense

Authors: Guanlin Liu, Lifeng lai | Published: 2020-02-19 | Updated: 2020-02-21
Robustness Evaluation
Toxicity of Rewards
Behavior Manipulation Attack