Attack Method

Systematic Attack Surface Reduction For Deployed Sentiment Analysis Models

Authors: Josh Kalin, David Noever, Gerry Dozier | Published: 2020-06-19
Attack Method
Adversarial Learning
Defense Mechanism

Adversarial Attacks for Multi-view Deep Models

Authors: Xuli Sun, Shiliang Sun | Published: 2020-06-19
Attack Method
Adversarial Example
Adversarial attack

Classifier-independent Lower-Bounds for Adversarial Robustness

Authors: Elvis Dohmatob | Published: 2020-06-17 | Updated: 2020-11-10
Bayesian Classification
Attack Method
Adversarial Learning

AdvMind: Inferring Adversary Intent of Black-Box Attacks

Authors: Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2020-06-16
Performance Evaluation
Attack Method
Adversarial Learning

On Adversarial Bias and the Robustness of Fair Machine Learning

Authors: Hongyan Chang, Ta Duy Nguyen, Sasi Kumar Murakonda, Ehsan Kazemi, Reza Shokri | Published: 2020-06-15
Poisoning
Membership Inference
Attack Method

Ensemble-based Feature Selection and Classification Model for DNS Typo-squatting Detection

Authors: Abdallah Moubayed, Emad Aqeeli, Abdallah Shami | Published: 2020-06-08
Attack Method
Feature Engineering
Vulnerability detection

MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation

Authors: Sanjay Kariyappa, Atul Prakash, Moinuddin Qureshi | Published: 2020-05-06 | Updated: 2022-10-28
Algorithm
Attack Method
Optimization Methods

Live Trojan Attacks on Deep Neural Networks

Authors: Robby Costales, Chengzhi Mao, Raphael Norwitz, Bryan Kim, Junfeng Yang | Published: 2020-04-22 | Updated: 2020-05-27
Trojan Detection
Attack Method
Deep Learning Technology

Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks

Authors: William Aiken, Hyoungshick Kim, Simon Woo | Published: 2020-04-22
Attack Method
Intellectual Property Protection
Watermark Removal Technology

A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models

Authors: Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, Ting Wang | Published: 2019-11-05 | Updated: 2020-11-21
Poisoning
Attack Method
Adversarial Example