Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection Authors: Andrea Paudice, Luis Muñoz-González, Andras Gyorgy, Emil C. Lupu | Published: 2018-02-08 PoisoningAdversarial attackDetection of Poisonous Data 2018.02.08 2025.05.28 Literature Database
Query-Efficient Black-box Adversarial Examples (superceded) Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin | Published: 2017-12-19 | Updated: 2018-04-06 PoisoningAdversarial LearningAdversarial Attack Methods 2017.12.19 2025.05.28 Literature Database
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning Authors: Battista Biggio, Fabio Roli | Published: 2017-12-08 | Updated: 2018-07-19 PoisoningAdversarial LearningAdversarial Attack Methods 2017.12.08 2025.05.28 Literature Database
LatentPoison – Adversarial Attacks On The Latent Space Authors: Antonia Creswell, Anil A. Bharath, Biswa Sengupta | Published: 2017-11-08 PoisoningCertified RobustnessAdversarial attack 2017.11.08 2025.05.28 Literature Database
Practical Attacks Against Graph-based Clustering Authors: Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou | Published: 2017-08-29 Community DetectionPoisoningAttack Method 2017.08.29 2025.05.28 Literature Database
Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization Authors: Luis Muñoz-González, Battista Biggio, Ambra Demontis, Andrea Paudice, Vasin Wongrassamee, Emil C. Lupu, Fabio Roli | Published: 2017-08-29 PoisoningOptimization MethodsDeep Learning Model 2017.08.29 2025.05.28 Literature Database
ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models Authors: Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, Cho-Jui Hsieh | Published: 2017-08-14 | Updated: 2017-11-02 PoisoningCertified RobustnessAttack Method 2017.08.14 2025.05.28 Literature Database
Certified Defenses for Data Poisoning Attacks Authors: Jacob Steinhardt, Pang Wei Koh, Percy Liang | Published: 2017-06-09 | Updated: 2017-11-24 PoisoningOptimization ProblemDetection of Poisonous Data 2017.06.09 2025.05.28 Literature Database
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection Authors: Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli | Published: 2017-04-28 PoisoningMalware Detection ScenarioModel Extraction Attack 2017.04.28 2025.05.28 Literature Database
Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks Authors: Yi Han, Benjamin I. P. Rubinstein | Published: 2017-04-06 | Updated: 2017-05-25 PoisoningCertified RobustnessAdversarial Learning 2017.04.06 2025.05.28 Literature Database