AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2020-07-15 | Updated: 2020-10-23 Performance EvaluationAttack MethodGenerative Model Characteristics 2020.07.15 2025.05.28 Literature Database
Robustifying Reinforcement Learning Agents via Action Space Adversarial Training Authors: Kai Liang Tan, Yasaman Esfandiari, Xian Yeow Lee, Aakanksha, Soumik Sarkar | Published: 2020-07-14 Performance EvaluationAttack MethodDefense Mechanism 2020.07.14 2025.05.28 Literature Database
Security and Machine Learning in the Real World Authors: Ivan Evtimov, Weidong Cui, Ece Kamar, Emre Kiciman, Tadayoshi Kohno, Jerry Li | Published: 2020-07-13 Security AnalysisAttack MethodAdversarial Example 2020.07.13 2025.05.28 Literature Database
A simple defense against adversarial attacks on heatmap explanations Authors: Laura Rieger, Lars Kai Hansen | Published: 2020-07-13 PoisoningAttack MethodDefense Mechanism 2020.07.13 2025.05.28 Literature Database
Simple and Efficient Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes Authors: Satya Narayan Shukla, Anit Kumar Sahu, Devin Willmott, J. Zico Kolter | Published: 2020-07-13 | Updated: 2021-06-11 Attack MethodDimensionality Reduction MethodDeep Learning 2020.07.13 2025.05.28 Literature Database
ManiGen: A Manifold Aided Black-box Generator of Adversarial Examples Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah, Abdulelah Algosaibi, Adel Aldalbahi, Mohammed Alaneem, Abdulaziz Alhumam, Mohammed Anan | Published: 2020-07-11 Attack MethodAdversarial ExampleDefense Mechanism 2020.07.11 2025.05.28 Literature Database
Generating Adversarial Inputs Using A Black-box Differential Technique Authors: João Batista Pereira Matos Juúnior, Lucas Carvalho Cordeiro, Marcelo d'Amorim, Xiaowei Huang | Published: 2020-07-10 Performance EvaluationAttack MethodAdversarial Example 2020.07.10 2025.05.28 Literature Database
Attack of the Tails: Yes, You Really Can Backdoor Federated Learning Authors: Hongyi Wang, Kartik Sreenivasan, Shashank Rajput, Harit Vishwakarma, Saurabh Agarwal, Jy-yong Sohn, Kangwook Lee, Dimitris Papailiopoulos | Published: 2020-07-09 PoisoningModel RobustnessAttack Method 2020.07.09 2025.05.28 Literature Database
Just How Toxic is Data Poisoning? A Unified Benchmark for Backdoor and Data Poisoning Attacks Authors: Avi Schwarzschild, Micah Goldblum, Arjun Gupta, John P Dickerson, Tom Goldstein | Published: 2020-06-22 | Updated: 2021-06-17 PoisoningPoisoning AttackAttack Method 2020.06.22 2025.05.28 Literature Database
Graph Backdoor Authors: Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang | Published: 2020-06-21 | Updated: 2021-08-10 Graph Neural NetworkAttack MethodWatermarking Technology 2020.06.21 2025.05.28 Literature Database