Copycat CNN: Stealing Knowledge by Persuading Confession with Random Non-Labeled Data Authors: Jacson Rodrigues Correia-Silva, Rodrigo F. Berriel, Claudine Badue, Alberto F. de Souza, Thiago Oliveira-Santos | Published: 2018-06-14 PoisoningCertified RobustnessFace Recognition System 2018.06.14 2025.05.28 Literature Database
Adversarial Regression with Multiple Learners Authors: Liang Tong, Sixie Yu, Scott Alfeld, Yevgeniy Vorobeychik | Published: 2018-06-06 PoisoningLoss FunctionAdversarial Learning 2018.06.06 2025.05.28 Literature Database
Adversarial Attacks on Neural Networks for Graph Data Authors: Daniel Zügner, Amir Akbarnejad, Stephan Günnemann | Published: 2018-05-21 | Updated: 2021-12-09 PoisoningCertified RobustnessAdversarial Attack Detection 2018.05.21 2025.05.28 Literature Database
Gradient-Leaks: Understanding and Controlling Deanonymization in Federated Learning Authors: Tribhuvanesh Orekondy, Seong Joon Oh, Yang Zhang, Bernt Schiele, Mario Fritz | Published: 2018-05-15 | Updated: 2020-09-13 Privacy-Preserving Machine LearningPoisoningUser Behavior Analysis 2018.05.15 2025.05.28 Literature Database
Is feature selection secure against training data poisoning? Authors: Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, Fabio Roli | Published: 2018-04-21 PoisoningDetection of Poisonous DataContent Specialized for Toxicity Attacks 2018.04.21 2025.05.28 Literature Database
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks Authors: Ali Shafahi, W. Ronny Huang, Mahyar Najibi, Octavian Suciu, Christoph Studer, Tudor Dumitras, Tom Goldstein | Published: 2018-04-03 | Updated: 2018-11-10 Backdoor AttackPoisoningDetection of Poisonous Data 2018.04.03 2025.05.28 Literature Database
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning Authors: Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li | Published: 2018-04-01 | Updated: 2021-09-28 PoisoningLoss FunctionDetection of Poisonous Data 2018.04.01 2025.05.28 Literature Database
Adversarial Defense based on Structure-to-Signal Autoencoders Authors: Joachim Folz, Sebastian Palacio, Joern Hees, Damian Borth, Andreas Dengel | Published: 2018-03-21 PoisoningAdversarial LearningImage Feature Extraction 2018.03.21 2025.05.28 Literature Database
The Hidden Vulnerability of Distributed Learning in Byzantium Authors: El Mahdi El Mhamdi, Rachid Guerraoui, Sébastien Rouault | Published: 2018-02-22 | Updated: 2018-07-17 PoisoningAdversarial attackMachine Learning Method 2018.02.22 2025.05.28 Literature Database
Attack Strength vs. Detectability Dilemma in Adversarial Machine Learning Authors: Christopher Frederickson, Michael Moore, Glenn Dawson, Robi Polikar | Published: 2018-02-20 PoisoningAdversarial Example DetectionAdversarial attack 2018.02.20 2025.05.28 Literature Database