Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization Authors: Luis Muñoz-González, Battista Biggio, Ambra Demontis, Andrea Paudice, Vasin Wongrassamee, Emil C. Lupu, Fabio Roli | Published: 2017-08-29 PoisoningOptimization MethodsDeep Learning Model 2017.08.29 2025.05.28 Literature Database
ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models Authors: Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, Cho-Jui Hsieh | Published: 2017-08-14 | Updated: 2017-11-02 PoisoningCertified RobustnessAttack Method 2017.08.14 2025.05.28 Literature Database
Certified Defenses for Data Poisoning Attacks Authors: Jacob Steinhardt, Pang Wei Koh, Percy Liang | Published: 2017-06-09 | Updated: 2017-11-24 PoisoningOptimization ProblemDetection of Poisonous Data 2017.06.09 2025.05.28 Literature Database
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection Authors: Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli | Published: 2017-04-28 PoisoningMalware Detection ScenarioModel Extraction Attack 2017.04.28 2025.05.28 Literature Database
Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks Authors: Yi Han, Benjamin I. P. Rubinstein | Published: 2017-04-06 | Updated: 2017-05-25 PoisoningCertified RobustnessAdversarial Learning 2017.04.06 2025.05.28 Literature Database
Understanding Black-box Predictions via Influence Functions Authors: Pang Wei Koh, Percy Liang | Published: 2017-03-14 | Updated: 2020-12-29 PoisoningImprovement of LearningExplainability Evaluation 2017.03.14 2025.05.28 Literature Database
Generative Poisoning Attack Method Against Neural Networks Authors: Chaofei Yang, Qing Wu, Hai Li, Yiran Chen | Published: 2017-03-03 Trigger DetectionPoisoningGenerative Model 2017.03.03 2025.05.28 Literature Database