Universal Decision-Based Black-Box Perturbations: Breaking Security-Through-Obscurity Defenses Authors: Thomas A. Hogan, Bhavya Kailkhura | Published: 2018-11-09 | Updated: 2018-11-13 Trigger DetectionMalicious Content GenerationAttack Evaluation 2018.11.09 2025.05.28 Literature Database
Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering Authors: Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian Molloy, Biplav Srivastava | Published: 2018-11-09 Backdoor Attack MitigationDetection of Poison Data for Backdoor AttacksPoisoning Attack 2018.11.09 2025.05.28 Literature Database
YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes Authors: Sourav Das, Vinay Joseph Ribeiro, Abhijeet Anand | Published: 2018-11-08 | Updated: 2018-12-18 Byzantine Attack CountermeasuresConsensus Formation AlgorithmMalicious Node Detection 2018.11.08 2025.05.28 Literature Database
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning Authors: Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh | Published: 2018-11-08 | Updated: 2019-08-26 PoisoningMalicious Content GenerationAdversarial Learning 2018.11.08 2025.05.28 Literature Database
MixTrain: Scalable Training of Verifiably Robust Neural Networks Authors: Shiqi Wang, Yizheng Chen, Ahmed Abdou, Suman Jana | Published: 2018-11-06 | Updated: 2018-12-01 Model Performance EvaluationRobustness ImprovementAdversarial Learning 2018.11.06 2025.05.28 Literature Database
Exploring Connections Between Active Learning and Model Extraction Authors: Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan | Published: 2018-11-05 | Updated: 2019-11-20 Online LearningModel Performance EvaluationModel Extraction Attack 2018.11.05 2025.05.28 Literature Database
Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls Authors: Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, Jason H. Li | Published: 2018-11-05 Online LearningMembership InferenceAdversarial Example 2018.11.05 2025.05.28 Literature Database
Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique | Published: 2018-11-05 IoT SecurityPoisoning AttackModel Extraction Attack 2018.11.05 2025.05.28 Literature Database
FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning Authors: Faiq Khalid, Muhammmad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique | Published: 2018-11-04 Model Extraction AttackAttack EvaluationDefense Method 2018.11.04 2025.05.28 Literature Database
SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters Authors: Hassan Ali, Faiq Khalid, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-04 | Updated: 2020-05-15 Trigger DetectionRobustness ImprovementAttack Evaluation 2018.11.04 2025.05.28 Literature Database