Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness Authors: Pu Zhao, Pin-Yu Chen, Payel Das, Karthikeyan Natesan Ramamurthy, Xue Lin | Published: 2020-04-30 | Updated: 2020-07-03 Backdoor AttackPoisoningRobustness Improvement Method 2020.04.30 2025.05.28 Literature Database
Bias Busters: Robustifying DL-based Lithographic Hotspot Detectors Against Backdooring Attacks Authors: Kang Liu, Benjamin Tan, Gaurav Rajavendra Reddy, Siddharth Garg, Yiorgos Makris, Ramesh Karri | Published: 2020-04-26 PoisoningDeep Learning TechnologyEffectiveness Analysis of Defense Methods 2020.04.26 2025.05.28 Literature Database
Improved Adversarial Training via Learned Optimizer Authors: Yuanhao Xiong, Cho-Jui Hsieh | Published: 2020-04-25 PoisoningOptimization ProblemAdaptive Adversarial Training 2020.04.25 2025.05.28 Literature Database
A Black-box Adversarial Attack Strategy with Adjustable Sparsity and Generalizability for Deep Image Classifiers Authors: Arka Ghosh, Sankha Subhra Mullick, Shounak Datta, Swagatam Das, Rammohan Mallipeddi, Asit Kr. Das | Published: 2020-04-24 | Updated: 2021-09-09 PoisoningAdversarial Attack MethodsOptimization Problem 2020.04.24 2025.05.28 Literature Database
Adversarial Attacks and Defenses: An Interpretation Perspective Authors: Ninghao Liu, Mengnan Du, Ruocheng Guo, Huan Liu, Xia Hu | Published: 2020-04-23 | Updated: 2020-10-07 PoisoningAdversarial ExampleAdversarial Attack Methods 2020.04.23 2025.05.28 Literature Database
How to compare adversarial robustness of classifiers from a global perspective Authors: Niklas Risse, Christina Göpfert, Jan Philip Göpfert | Published: 2020-04-22 | Updated: 2020-10-15 PoisoningRobustness AnalysisEvaluation Method 2020.04.22 2025.05.28 Literature Database
A Framework for Evaluating Gradient Leakage Attacks in Federated Learning Authors: Wenqi Wei, Ling Liu, Margaret Loper, Ka-Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2020-04-22 | Updated: 2020-04-23 Privacy Enhancing TechnologyPoisoningAttack Type 2020.04.22 2025.05.28 Literature Database
Headless Horseman: Adversarial Attacks on Transfer Learning Models Authors: Ahmed Abdelkader, Michael J. Curry, Liam Fowl, Tom Goldstein, Avi Schwarzschild, Manli Shu, Christoph Studer, Chen Zhu | Published: 2020-04-20 PoisoningAdversarial Perturbation TechniquesMachine Learning 2020.04.20 2025.05.28 Literature Database
Data Poisoning Attacks on Federated Machine Learning Authors: Gan Sun, Yang Cong, Jiahua Dong, Qiang Wang, Ji Liu | Published: 2020-04-19 PoisoningAttack Scenario AnalysisMachine Learning 2020.04.19 2025.05.28 Literature Database
Poisoning Attacks on Algorithmic Fairness Authors: David Solans, Battista Biggio, Carlos Castillo | Published: 2020-04-15 | Updated: 2020-06-26 Algorithm FairnessPoisoningOptimization Methods 2020.04.15 2025.05.28 Literature Database