Adversarial Attacks and Defenses on Graphs: A Review, A Tool and Empirical Studies Authors: Wei Jin, Yaxin Li, Han Xu, Yiqi Wang, Shuiwang Ji, Charu Aggarwal, Jiliang Tang | Published: 2020-03-02 | Updated: 2020-12-12 PoisoningAdversarial ExampleAdversarial Learning 2020.03.02 2025.05.28 Literature Database
Regularisation Can Mitigate Poisoning Attacks: A Novel Analysis Based on Multiobjective Bilevel Optimisation Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2020-02-28 | Updated: 2020-06-20 Hyperparameter OptimizationPoisoningRobustness Evaluation 2020.02.28 2025.05.28 Literature Database
Towards Backdoor Attacks and Defense in Robust Machine Learning Models Authors: Ezekiel Soremekun, Sakshi Udeshi, Sudipta Chattopadhyay | Published: 2020-02-25 | Updated: 2023-01-11 Backdoor AttackPoisoningRobustness Evaluation 2020.02.25 2025.05.28 Literature Database
Influence Function based Data Poisoning Attacks to Top-N Recommender Systems Authors: Minghong Fang, Neil Zhenqiang Gong, Jia Liu | Published: 2020-02-19 | Updated: 2020-05-31 PoisoningMaximum Coverage ProblemThreat modeling 2020.02.19 2025.05.28 Literature Database
Deflecting Adversarial Attacks Authors: Yao Qin, Nicholas Frosst, Colin Raffel, Garrison Cottrell, Geoffrey Hinton | Published: 2020-02-18 PoisoningAdversarial Attack DetectionDefense Method 2020.02.18 2025.05.28 Literature Database
Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets Authors: Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey, Xingjun Ma | Published: 2020-02-14 PoisoningAdversarial Attack DetectionDefense Method 2020.02.14 2025.05.28 Literature Database
CEB Improves Model Robustness Authors: Ian Fischer, Alexander A. Alemi | Published: 2020-02-13 PoisoningModel Selection MethodRobustness Evaluation 2020.02.13 2025.05.28 Literature Database
Adversarial Robustness for Code Authors: Pavol Bielik, Martin Vechev | Published: 2020-02-11 | Updated: 2020-08-15 PoisoningRobustness Improvement MethodAdversarial Training 2020.02.11 2025.05.28 Literature Database
Adversarial Data Encryption Authors: Yingdong Hu, Liang Zhang, Wei Shan, Xiaoxiao Qin, Jing Qi, Zhenzhou Wu, Yang Yuan | Published: 2020-02-10 | Updated: 2020-02-11 PoisoningAdversarial attackCryptography 2020.02.10 2025.05.28 Literature Database
Certified Robustness to Label-Flipping Attacks via Randomized Smoothing Authors: Elan Rosenfeld, Ezra Winston, Pradeep Ravikumar, J. Zico Kolter | Published: 2020-02-07 | Updated: 2020-08-11 PoisoningRobustness Improvement MethodContinuous Linear Function 2020.02.07 2025.05.28 Literature Database