Systematic Attack Surface Reduction For Deployed Sentiment Analysis Models Authors: Josh Kalin, David Noever, Gerry Dozier | Published: 2020-06-19 Attack MethodAdversarial LearningDefense Mechanism 2020.06.19 2025.05.28 Literature Database
Adversarial Attacks for Multi-view Deep Models Authors: Xuli Sun, Shiliang Sun | Published: 2020-06-19 Attack MethodAdversarial ExampleAdversarial attack 2020.06.19 2025.05.28 Literature Database
Classifier-independent Lower-Bounds for Adversarial Robustness Authors: Elvis Dohmatob | Published: 2020-06-17 | Updated: 2020-11-10 Bayesian ClassificationAttack MethodAdversarial Learning 2020.06.17 2025.05.28 Literature Database
AdvMind: Inferring Adversary Intent of Black-Box Attacks Authors: Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2020-06-16 Performance EvaluationAttack MethodAdversarial Learning 2020.06.16 2025.05.28 Literature Database
On Adversarial Bias and the Robustness of Fair Machine Learning Authors: Hongyan Chang, Ta Duy Nguyen, Sasi Kumar Murakonda, Ehsan Kazemi, Reza Shokri | Published: 2020-06-15 PoisoningMembership InferenceAttack Method 2020.06.15 2025.05.28 Literature Database
Ensemble-based Feature Selection and Classification Model for DNS Typo-squatting Detection Authors: Abdallah Moubayed, Emad Aqeeli, Abdallah Shami | Published: 2020-06-08 Attack MethodFeature EngineeringVulnerability detection 2020.06.08 2025.05.28 Literature Database
MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation Authors: Sanjay Kariyappa, Atul Prakash, Moinuddin Qureshi | Published: 2020-05-06 | Updated: 2022-10-28 AlgorithmAttack MethodOptimization Methods 2020.05.06 2025.05.28 Literature Database
Live Trojan Attacks on Deep Neural Networks Authors: Robby Costales, Chengzhi Mao, Raphael Norwitz, Bryan Kim, Junfeng Yang | Published: 2020-04-22 | Updated: 2020-05-27 Trojan DetectionAttack MethodDeep Learning Technology 2020.04.22 2025.05.28 Literature Database
Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks Authors: William Aiken, Hyoungshick Kim, Simon Woo | Published: 2020-04-22 Attack MethodIntellectual Property ProtectionWatermark Removal Technology 2020.04.22 2025.05.28 Literature Database
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models Authors: Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, Ting Wang | Published: 2019-11-05 | Updated: 2020-11-21 PoisoningAttack MethodAdversarial Example 2019.11.05 2025.05.28 Literature Database