Poisoning

Adversarial Security Attacks and Perturbations on Machine Learning and Deep Learning Methods

Authors: Arif Siddiqi | Published: 2019-07-17
Poisoning
Adversarial Example
Adversarial Attack Methods

Helen: Maliciously Secure Coopetitive Learning for Linear Models

Authors: Wenting Zheng, Raluca Ada Popa, Joseph E. Gonzalez, Ion Stoica | Published: 2019-07-16 | Updated: 2019-09-03
MPC Algorithm
Poisoning
Encryption Technology

Stateful Detection of Black-Box Adversarial Attacks

Authors: Steven Chen, Nicholas Carlini, David Wagner | Published: 2019-07-12
Poisoning
Attack Detection
Adversarial attack

Minimally distorted Adversarial Examples with a Fast Adaptive Boundary Attack

Authors: Francesco Croce, Matthias Hein | Published: 2019-07-03 | Updated: 2020-07-20
Poisoning
Vulnerability of Adversarial Examples
Adversarial attack

Comment on “Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network”

Authors: Roland S. Zimmermann | Published: 2019-07-01
Poisoning
Adversarial attack
Deep Learning Method

Improving Black-box Adversarial Attacks with a Transfer-based Prior

Authors: Shuyu Cheng, Yinpeng Dong, Tianyu Pang, Hang Su, Jun Zhu | Published: 2019-06-17 | Updated: 2020-07-26
Poisoning
Adversarial Perturbation Techniques
Optimization Problem

Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers

Authors: Hadi Salman, Greg Yang, Jerry Li, Pengchuan Zhang, Huan Zhang, Ilya Razenshteyn, Sebastien Bubeck | Published: 2019-06-09 | Updated: 2020-01-10
Poisoning
Adversarial Learning
Defense Method

Adversarial Explanations for Understanding Image Classification Decisions and Improved Neural Network Robustness

Authors: Walt Woods, Jack Chen, Christof Teuscher | Published: 2019-06-07 | Updated: 2019-08-06
Poisoning
Adversarial Example
Adversarial Training

Variational Inference for Graph Convolutional Networks in the Absence of Graph Data and Adversarial Settings

Authors: Pantelis Elinas, Edwin V. Bonilla, Louis Tiao | Published: 2019-06-05 | Updated: 2020-10-21
Data Extraction and Analysis
Poisoning
Deep Learning Technology

Unlabeled Data Improves Adversarial Robustness

Authors: Yair Carmon, Aditi Raghunathan, Ludwig Schmidt, Percy Liang, John C. Duchi | Published: 2019-05-31 | Updated: 2022-01-13
Poisoning
Robustness Verification Method
Deep Learning Method