Poisoning

An Adaptive View of Adversarial Robustness from Test-time Smoothing Defense

Authors: Chao Tang, Yifei Fan, Anthony Yezzi | Published: 2019-11-26
Poisoning
Adversarial Example
Research Methodology

Local Model Poisoning Attacks to Byzantine-Robust Federated Learning

Authors: Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2019-11-26 | Updated: 2021-11-21
Poisoning
Model Performance Evaluation
Attack Type

Adversarial Learning of Privacy-Preserving and Task-Oriented Representations

Authors: Taihong Xiao, Yi-Hsuan Tsai, Kihyuk Sohn, Manmohan Chandraker, Ming-Hsuan Yang | Published: 2019-11-22
Privacy-Preserving Data Mining
Poisoning
Membership Inference

Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic

Authors: Zhen Xiang, David J. Miller, Hang Wang, George Kesidis | Published: 2019-11-18 | Updated: 2020-04-06
Detection and localization of DDIA
Backdoor Attack
Poisoning

Adversarial Examples in Modern Machine Learning: A Review

Authors: Rey Reza Wiyatno, Anqi Xu, Ousmane Dia, Archy de Berker | Published: 2019-11-13 | Updated: 2019-11-15
Poisoning
Adversarial Example
Adversarial Attack Methods

A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models

Authors: Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, Ting Wang | Published: 2019-11-05 | Updated: 2020-11-21
Poisoning
Attack Method
Adversarial Example

Online Robustness Training for Deep Reinforcement Learning

Authors: Marc Fischer, Matthew Mirman, Steven Stalder, Martin Vechev | Published: 2019-11-03 | Updated: 2019-11-22
Poisoning
Improvement of Learning
Knowledge Distillation

Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization

Authors: Rana Abou Khamis, Omair Shafiq, Ashraf Matrawy | Published: 2019-10-30
Poisoning
Attack Method
Adversarial Example

Secure and Efficient Federated Transfer Learning

Authors: Shreya Sharma, Xing Chaoping, Yang Liu, Yan Kang | Published: 2019-10-29 | Updated: 2019-10-30
Privacy Management
Poisoning
Deep Transfer Learning

Label Smoothing and Logit Squeezing: A Replacement for Adversarial Training?

Authors: Ali Shafahi, Amin Ghiasi, Furong Huang, Tom Goldstein | Published: 2019-10-25
Poisoning
Improvement of Learning
Adversarial Example