When Machine Unlearning Jeopardizes Privacy Authors: Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2020-05-05 | Updated: 2021-09-14 PoisoningMembership InferencePrivacy Protection in Machine Learning 2020.05.05 2025.05.28 Literature Database
Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Information Security Authors: Michael R. Smith, Nicholas T. Johnson, Joe B. Ingram, Armida J. Carbajal, Ramyaa Ramyaa, Evelyn Domschot, Christopher C. Lamb, Stephen J. Verzi, W. Philip Kegelmeyer | Published: 2020-05-04 PoisoningMalware ClassificationRole of Machine Learning 2020.05.04 2025.05.28 Literature Database
Depth-2 Neural Networks Under a Data-Poisoning Attack Authors: Sayar Karmakar, Anirbit Mukherjee, Theodore Papamarkou | Published: 2020-05-04 | Updated: 2022-06-29 AlgorithmPoisoningevaluation metrics 2020.05.04 2025.05.28 Literature Database
Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware? Authors: Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli | Published: 2020-05-04 | Updated: 2021-05-27 PoisoningMalware ClassificationAdversarial Example 2020.05.04 2025.05.28 Literature Database
Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability Authors: Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna | Published: 2020-05-01 | Updated: 2021-03-14 Backdoor AttackPoisoningDefense Effectiveness Analysis 2020.05.01 2025.05.28 Literature Database
Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness Authors: Pu Zhao, Pin-Yu Chen, Payel Das, Karthikeyan Natesan Ramamurthy, Xue Lin | Published: 2020-04-30 | Updated: 2020-07-03 Backdoor AttackPoisoningRobustness Improvement Method 2020.04.30 2025.05.28 Literature Database
Bias Busters: Robustifying DL-based Lithographic Hotspot Detectors Against Backdooring Attacks Authors: Kang Liu, Benjamin Tan, Gaurav Rajavendra Reddy, Siddharth Garg, Yiorgos Makris, Ramesh Karri | Published: 2020-04-26 PoisoningDeep Learning TechnologyEffectiveness Analysis of Defense Methods 2020.04.26 2025.05.28 Literature Database
Improved Adversarial Training via Learned Optimizer Authors: Yuanhao Xiong, Cho-Jui Hsieh | Published: 2020-04-25 PoisoningOptimization ProblemAdaptive Adversarial Training 2020.04.25 2025.05.28 Literature Database
A Black-box Adversarial Attack Strategy with Adjustable Sparsity and Generalizability for Deep Image Classifiers Authors: Arka Ghosh, Sankha Subhra Mullick, Shounak Datta, Swagatam Das, Rammohan Mallipeddi, Asit Kr. Das | Published: 2020-04-24 | Updated: 2021-09-09 PoisoningAdversarial Attack MethodsOptimization Problem 2020.04.24 2025.05.28 Literature Database
Adversarial Attacks and Defenses: An Interpretation Perspective Authors: Ninghao Liu, Mengnan Du, Ruocheng Guo, Huan Liu, Xia Hu | Published: 2020-04-23 | Updated: 2020-10-07 PoisoningAdversarial ExampleAdversarial Attack Methods 2020.04.23 2025.05.28 Literature Database