MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation Authors: Sanjay Kariyappa, Atul Prakash, Moinuddin Qureshi | Published: 2020-05-06 | Updated: 2022-10-28 AlgorithmAttack MethodOptimization Methods 2020.05.06 2025.05.28 Literature Database
Live Trojan Attacks on Deep Neural Networks Authors: Robby Costales, Chengzhi Mao, Raphael Norwitz, Bryan Kim, Junfeng Yang | Published: 2020-04-22 | Updated: 2020-05-27 Trojan DetectionAttack MethodDeep Learning Technology 2020.04.22 2025.05.28 Literature Database
Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks Authors: William Aiken, Hyoungshick Kim, Simon Woo | Published: 2020-04-22 Attack MethodIntellectual Property ProtectionWatermark Removal Technology 2020.04.22 2025.05.28 Literature Database
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models Authors: Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, Ting Wang | Published: 2019-11-05 | Updated: 2020-11-21 PoisoningAttack MethodAdversarial Example 2019.11.05 2025.05.28 Literature Database
Fast-UAP: An Algorithm for Speeding up Universal Adversarial Perturbation Generation with Orientation of Perturbation Vectors Authors: Jiazhu Dai, Le Shu | Published: 2019-11-04 | Updated: 2020-01-06 Attack MethodAdversarial ExampleImage Processing 2019.11.04 2025.05.28 Literature Database
MadNet: Using a MAD Optimization for Defending Against Adversarial Attacks Authors: Shai Rozenberg, Gal Elidan, Ran El-Yaniv | Published: 2019-11-03 | Updated: 2020-06-12 Attack MethodAdversarial ExampleEffectiveness Analysis of Defense Methods 2019.11.03 2025.05.28 Literature Database
Reducing audio membership inference attack accuracy to chance: 4 defenses Authors: Michael Lomnitz, Nina Lopatina, Paul Gamble, Zigfried Hampel-Arias, Lucas Tindall, Felipe A. Mejia, Maria Alejandra Barrios | Published: 2019-10-31 Privacy ManagementAttack MethodEffectiveness Analysis of Defense Methods 2019.10.31 2025.05.28 Literature Database
Certifiable Robustness to Graph Perturbations Authors: Aleksandar Bojchevski, Stephan Günnemann | Published: 2019-10-31 | Updated: 2019-12-19 Graph Neural NetworkAttack MethodVulnerability Assessment Method 2019.10.31 2025.05.28 Literature Database
A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning Authors: Xuanqing Liu, Si Si, Xiaojin Zhu, Yang Li, Cho-Jui Hsieh | Published: 2019-10-30 Convergence analysisAttack MethodContent Specialized for Toxicity Attacks 2019.10.30 2025.05.28 Literature Database
Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization Authors: Rana Abou Khamis, Omair Shafiq, Ashraf Matrawy | Published: 2019-10-30 PoisoningAttack MethodAdversarial Example 2019.10.30 2025.05.28 Literature Database