Poisoning

Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection

Authors: Andrea Paudice, Luis Muñoz-González, Andras Gyorgy, Emil C. Lupu | Published: 2018-02-08
Poisoning
Adversarial attack
Detection of Poisonous Data

Query-Efficient Black-box Adversarial Examples (superceded)

Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin | Published: 2017-12-19 | Updated: 2018-04-06
Poisoning
Adversarial Learning
Adversarial Attack Methods

Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning

Authors: Battista Biggio, Fabio Roli | Published: 2017-12-08 | Updated: 2018-07-19
Poisoning
Adversarial Learning
Adversarial Attack Methods

LatentPoison – Adversarial Attacks On The Latent Space

Authors: Antonia Creswell, Anil A. Bharath, Biswa Sengupta | Published: 2017-11-08
Poisoning
Certified Robustness
Adversarial attack

Practical Attacks Against Graph-based Clustering

Authors: Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou | Published: 2017-08-29
Community Detection
Poisoning
Attack Method

Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization

Authors: Luis Muñoz-González, Battista Biggio, Ambra Demontis, Andrea Paudice, Vasin Wongrassamee, Emil C. Lupu, Fabio Roli | Published: 2017-08-29
Poisoning
Optimization Methods
Deep Learning Model

ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models

Authors: Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, Cho-Jui Hsieh | Published: 2017-08-14 | Updated: 2017-11-02
Poisoning
Certified Robustness
Attack Method

Certified Defenses for Data Poisoning Attacks

Authors: Jacob Steinhardt, Pang Wei Koh, Percy Liang | Published: 2017-06-09 | Updated: 2017-11-24
Poisoning
Optimization Problem
Detection of Poisonous Data

Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection

Authors: Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli | Published: 2017-04-28
Poisoning
Malware Detection Scenario
Model Extraction Attack

Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks

Authors: Yi Han, Benjamin I. P. Rubinstein | Published: 2017-04-06 | Updated: 2017-05-25
Poisoning
Certified Robustness
Adversarial Learning