Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification Authors: Sina Däubener, Lea Schönherr, Asja Fischer, Dorothea Kolossa | Published: 2020-05-24 | Updated: 2020-08-02 PoisoningQuantification of UncertaintyAdversarial Example Detection 2020.05.24 2025.05.28 Literature Database
Adversarial Attack on Hierarchical Graph Pooling Neural Networks Authors: Haoteng Tang, Guixiang Ma, Yurong Chen, Lei Guo, Wei Wang, Bo Zeng, Liang Zhan | Published: 2020-05-23 PoisoningAdversarial ExampleAdversarial attack 2020.05.23 2025.05.28 Literature Database
An Adversarial Approach for Explaining the Predictions of Deep Neural Networks Authors: Arash Rahnama, Andrew Tseng | Published: 2020-05-20 | Updated: 2020-09-28 AlgorithmPoisoningStatistical Analysis 2020.05.20 2025.05.28 Literature Database
On Intrinsic Dataset Properties for Adversarial Machine Learning Authors: Jeffrey Z. Pan, Nicholas Zufelt | Published: 2020-05-19 PoisoningPerformance Evaluation MetricsMachine Learning Method 2020.05.19 2025.05.28 Literature Database
Provable Robust Classification via Learned Smoothed Densities Authors: Saeed Saremi, Rupesh Srivastava | Published: 2020-05-09 Bayesian ClassificationPoisoningRobustness Improvement Method 2020.05.09 2025.05.28 Literature Database
When Machine Unlearning Jeopardizes Privacy Authors: Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2020-05-05 | Updated: 2021-09-14 PoisoningMembership InferencePrivacy Protection in Machine Learning 2020.05.05 2025.05.28 Literature Database
Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Information Security Authors: Michael R. Smith, Nicholas T. Johnson, Joe B. Ingram, Armida J. Carbajal, Ramyaa Ramyaa, Evelyn Domschot, Christopher C. Lamb, Stephen J. Verzi, W. Philip Kegelmeyer | Published: 2020-05-04 PoisoningMalware ClassificationRole of Machine Learning 2020.05.04 2025.05.28 Literature Database
Depth-2 Neural Networks Under a Data-Poisoning Attack Authors: Sayar Karmakar, Anirbit Mukherjee, Theodore Papamarkou | Published: 2020-05-04 | Updated: 2022-06-29 AlgorithmPoisoningevaluation metrics 2020.05.04 2025.05.28 Literature Database
Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware? Authors: Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli | Published: 2020-05-04 | Updated: 2021-05-27 PoisoningMalware ClassificationAdversarial Example 2020.05.04 2025.05.28 Literature Database
Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability Authors: Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna | Published: 2020-05-01 | Updated: 2021-03-14 Backdoor AttackPoisoningDefense Effectiveness Analysis 2020.05.01 2025.05.28 Literature Database