Poisoning

Attacking Graph-based Classification via Manipulating the Graph Structure

Authors: Binghui Wang, Neil Zhenqiang Gong | Published: 2019-03-01 | Updated: 2019-08-13
Poisoning
Model Inversion
Adversarial Graph Classification

TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents

Authors: Panagiota Kiourti, Kacper Wardega, Susmit Jha, Wenchao Li | Published: 2019-03-01
Poisoning
Reinforcement Learning
Adversarial Attack Methods

Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data

Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Willy Susilo, Yukun Bao | Published: 2019-02-23
Performance Evaluation
Phishing Detection
Poisoning

advertorch v0.1: An Adversarial Robustness Toolbox based on PyTorch

Authors: Gavin Weiguang Ding, Luyu Wang, Xiaomeng Jin | Published: 2019-02-20
Poisoning
Adversarial Learning
Research Methodology

Mitigation of Adversarial Examples in RF Deep Classifiers Utilizing AutoEncoder Pre-training

Authors: Silvija Kokalj-Filipovic, Rob Miller, Nicholas Chang, Chi Leung Lau | Published: 2019-02-16
Poisoning
Adversarial attack
Adversarial Attack Methods

Adversarial Attack and Defense on Graph Data: A Survey

Authors: Lichao Sun, Yingtong Dou, Carl Yang, Ji Wang, Yixin Liu, Philip S. Yu, Lifang He, Bo Li | Published: 2018-12-26 | Updated: 2022-10-06
Poisoning
Robustness
Adversarial Example

Analyzing Federated Learning through an Adversarial Lens

Authors: Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal, Seraphin Calo | Published: 2018-11-29 | Updated: 2019-11-25
Poisoning
Federated Learning
Weight Update Method

AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning

Authors: Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh | Published: 2018-11-08 | Updated: 2019-08-26
Poisoning
Malicious Content Generation
Adversarial Learning

TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks

Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-02 | Updated: 2020-05-14
Detection of Poison Data for Backdoor Attacks
Poisoning
Performance Evaluation Method

Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks

Authors: Davide Maiorca, Battista Biggio, Giorgio Giacinto | Published: 2018-11-02 | Updated: 2020-04-14
Poisoning
Malware Evolution
Certified Robustness