Poisoning

Adversarial Attacks and Defenses on Graphs: A Review, A Tool and Empirical Studies

Authors: Wei Jin, Yaxin Li, Han Xu, Yiqi Wang, Shuiwang Ji, Charu Aggarwal, Jiliang Tang | Published: 2020-03-02 | Updated: 2020-12-12
Poisoning
Adversarial Example
Adversarial Learning

Regularisation Can Mitigate Poisoning Attacks: A Novel Analysis Based on Multiobjective Bilevel Optimisation

Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2020-02-28 | Updated: 2020-06-20
Hyperparameter Optimization
Poisoning
Robustness Evaluation

Towards Backdoor Attacks and Defense in Robust Machine Learning Models

Authors: Ezekiel Soremekun, Sakshi Udeshi, Sudipta Chattopadhyay | Published: 2020-02-25 | Updated: 2023-01-11
Backdoor Attack
Poisoning
Robustness Evaluation

Influence Function based Data Poisoning Attacks to Top-N Recommender Systems

Authors: Minghong Fang, Neil Zhenqiang Gong, Jia Liu | Published: 2020-02-19 | Updated: 2020-05-31
Poisoning
Maximum Coverage Problem
Threat modeling

Deflecting Adversarial Attacks

Authors: Yao Qin, Nicholas Frosst, Colin Raffel, Garrison Cottrell, Geoffrey Hinton | Published: 2020-02-18
Poisoning
Adversarial Attack Detection
Defense Method

Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets

Authors: Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey, Xingjun Ma | Published: 2020-02-14
Poisoning
Adversarial Attack Detection
Defense Method

CEB Improves Model Robustness

Authors: Ian Fischer, Alexander A. Alemi | Published: 2020-02-13
Poisoning
Model Selection Method
Robustness Evaluation

Adversarial Robustness for Code

Authors: Pavol Bielik, Martin Vechev | Published: 2020-02-11 | Updated: 2020-08-15
Poisoning
Robustness Improvement Method
Adversarial Training

Adversarial Data Encryption

Authors: Yingdong Hu, Liang Zhang, Wei Shan, Xiaoxiao Qin, Jing Qi, Zhenzhou Wu, Yang Yuan | Published: 2020-02-10 | Updated: 2020-02-11
Poisoning
Adversarial attack
Cryptography

Certified Robustness to Label-Flipping Attacks via Randomized Smoothing

Authors: Elan Rosenfeld, Ezra Winston, Pradeep Ravikumar, J. Zico Kolter | Published: 2020-02-07 | Updated: 2020-08-11
Poisoning
Robustness Improvement Method
Continuous Linear Function