Attack Method

AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows

Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2020-07-15 | Updated: 2020-10-23
Performance Evaluation
Attack Method
Generative Model Characteristics

Robustifying Reinforcement Learning Agents via Action Space Adversarial Training

Authors: Kai Liang Tan, Yasaman Esfandiari, Xian Yeow Lee, Aakanksha, Soumik Sarkar | Published: 2020-07-14
Performance Evaluation
Attack Method
Defense Mechanism

Security and Machine Learning in the Real World

Authors: Ivan Evtimov, Weidong Cui, Ece Kamar, Emre Kiciman, Tadayoshi Kohno, Jerry Li | Published: 2020-07-13
Security Analysis
Attack Method
Adversarial Example

A simple defense against adversarial attacks on heatmap explanations

Authors: Laura Rieger, Lars Kai Hansen | Published: 2020-07-13
Poisoning
Attack Method
Defense Mechanism

Simple and Efficient Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes

Authors: Satya Narayan Shukla, Anit Kumar Sahu, Devin Willmott, J. Zico Kolter | Published: 2020-07-13 | Updated: 2021-06-11
Attack Method
Dimensionality Reduction Method
Deep Learning

ManiGen: A Manifold Aided Black-box Generator of Adversarial Examples

Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah, Abdulelah Algosaibi, Adel Aldalbahi, Mohammed Alaneem, Abdulaziz Alhumam, Mohammed Anan | Published: 2020-07-11
Attack Method
Adversarial Example
Defense Mechanism

Generating Adversarial Inputs Using A Black-box Differential Technique

Authors: João Batista Pereira Matos Juúnior, Lucas Carvalho Cordeiro, Marcelo d'Amorim, Xiaowei Huang | Published: 2020-07-10
Performance Evaluation
Attack Method
Adversarial Example

Attack of the Tails: Yes, You Really Can Backdoor Federated Learning

Authors: Hongyi Wang, Kartik Sreenivasan, Shashank Rajput, Harit Vishwakarma, Saurabh Agarwal, Jy-yong Sohn, Kangwook Lee, Dimitris Papailiopoulos | Published: 2020-07-09
Poisoning
Model Robustness
Attack Method

Just How Toxic is Data Poisoning? A Unified Benchmark for Backdoor and Data Poisoning Attacks

Authors: Avi Schwarzschild, Micah Goldblum, Arjun Gupta, John P Dickerson, Tom Goldstein | Published: 2020-06-22 | Updated: 2021-06-17
Poisoning
Poisoning Attack
Attack Method

Graph Backdoor

Authors: Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang | Published: 2020-06-21 | Updated: 2021-08-10
Graph Neural Network
Attack Method
Watermarking Technology