Literature Database

Characterizing Attacks on Deep Reinforcement Learning

Authors: Xinlei Pan, Chaowei Xiao, Warren He, Shuang Yang, Jian Peng, Mingjie Sun, Jinfeng Yi, Zijiang Yang, Mingyan Liu, Bo Li, Dawn Song | Published: 2019-07-21 | Updated: 2022-02-16
Adversarial Attack Detection
Deep Reinforcement Learning
Physical attack

DaiMoN: A Decentralized Artificial Intelligence Model Network

Authors: Surat Teerapittayanon, H. T. Kung | Published: 2019-07-19
Data Generation
Blockchain Integration
Machine Learning Technology

Robustness properties of Facebook’s ResNeXt WSL models

Authors: A. Emin Orhan | Published: 2019-07-17 | Updated: 2019-12-09
Adversarial Attack Methods
Deep Learning Technology
Watermarking Technology

Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics

Authors: Yuxin Ma, Tiankai Xie, Jundong Li, Ross Maciejewski | Published: 2019-07-17 | Updated: 2019-10-03
Backdoor Attack
Poisoning
Adversarial Attack Methods

Adversarial Security Attacks and Perturbations on Machine Learning and Deep Learning Methods

Authors: Arif Siddiqi | Published: 2019-07-17
Poisoning
Adversarial Example
Adversarial Attack Methods

Decentralized & Collaborative AI on Blockchain

Authors: Justin D. Harris, Bo Waggoner | Published: 2019-07-16
Privacy Issues
Blockchain Economics
Machine Learning Method

Helen: Maliciously Secure Coopetitive Learning for Linear Models

Authors: Wenting Zheng, Raluca Ada Popa, Joseph E. Gonzalez, Ion Stoica | Published: 2019-07-16 | Updated: 2019-09-03
MPC Algorithm
Poisoning
Encryption Technology

Latent Adversarial Defence with Boundary-guided Generation

Authors: Xiaowei Zhou, Ivor W. Tsang, Jie Yin | Published: 2019-07-16
Adversarial Example
Adversarial Attack Methods
Deep Learning Technology

Evaluating Explanation Without Ground Truth in Interpretable Machine Learning

Authors: Fan Yang, Mengnan Du, Xia Hu | Published: 2019-07-16 | Updated: 2019-08-15
XAI (Explainable AI)
Model Interpretability
Adversarial Example

Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving

Authors: Yulong Cao, Chaowei Xiao, Benjamin Cyr, Yimeng Zhou, Won Park, Sara Rampazzi, Qi Alfred Chen, Kevin Fu, Z. Morley Mao | Published: 2019-07-16 | Updated: 2019-08-20
Spoofing Attack Analysis
Adversarial Attack Methods
Optimization Methods