GOAT: GPU Outsourcing of Deep Learning Training With Asynchronous Probabilistic Integrity Verification Inside Trusted Execution Environment Authors: Aref Asvadishirehjini, Murat Kantarcioglu, Bradley Malin | Published: 2020-10-17 TEE ImplementationPoisoningAttack Method 2020.10.17 2025.05.28 Literature Database
An Analysis of Robustness of Non-Lipschitz Networks Authors: Maria-Florina Balcan, Avrim Blum, Dravyansh Sharma, Hongyang Zhang | Published: 2020-10-13 | Updated: 2023-04-18 Loss FunctionAttack MethodAdversarial Training 2020.10.13 2025.05.28 Literature Database
Data Analytics-enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets Authors: Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed | Published: 2020-10-04 Dataset GenerationData Extraction and AnalysisAttack Method 2020.10.04 2025.05.28 Literature Database
Near Optimal Adversarial Attacks on Stochastic Bandits and Defenses with Smoothed Responses Authors: Shiliang Zuo | Published: 2020-08-21 | Updated: 2024-03-14 Game TheoryAttack MethodAdversarial Learning 2020.08.21 2025.05.28 Literature Database
Defending Distributed Classifiers Against Data Poisoning Attacks Authors: Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie | Published: 2020-08-21 PoisoningAttack MethodAdversarial Learning 2020.08.21 2025.05.28 Literature Database
Towards Class-Oriented Poisoning Attacks Against Neural Networks Authors: Bingyin Zhao, Yingjie Lao | Published: 2020-07-31 | Updated: 2021-10-11 Backdoor AttackPoisoningAttack Method 2020.07.31 2025.05.28 Literature Database
Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-07-31 PoisoningAttack MethodDeep Learning 2020.07.31 2025.05.28 Literature Database
TEAM: We Need More Powerful Adversarial Examples for DNNs Authors: Yaguan Qian, Ximin Zhang, Bin Wang, Wei Li, Zhaoquan Gu, Haijiang Wang, Wassim Swaileh | Published: 2020-07-31 | Updated: 2020-08-10 Attack MethodAdversarial ExampleComputational Efficiency 2020.07.31 2025.05.28 Literature Database
Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases Authors: Ren Wang, Gaoyuan Zhang, Sijia Liu, Pin-Yu Chen, Jinjun Xiong, Meng Wang | Published: 2020-07-31 Backdoor AttackPoisoningAttack Method 2020.07.31 2025.05.28 Literature Database
Membership Leakage in Label-Only Exposures Authors: Zheng Li, Yang Zhang | Published: 2020-07-30 | Updated: 2021-09-17 Membership InferencePerformance EvaluationAttack Method 2020.07.30 2025.05.28 Literature Database