Adversarial Attack Methods

Constructing Semantics-Aware Adversarial Examples with a Probabilistic Perspective

Authors: Andi Zhang, Mingtian Zhang, Damon Wischik | Published: 2023-06-01 | Updated: 2024-11-24
Poisoning
Diffusion Model
Adversarial Attack Methods

Verifiable Learning for Robust Tree Ensembles

Authors: Stefano Calzavara, Lorenzo Cazzaro, Giulio Ermanno Pibiri, Nicola Prezza | Published: 2023-05-05 | Updated: 2023-11-11
Random Forest
Adversarial Attack Methods
Decision Tree

SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection

Authors: Giovanni Apruzzese, Pavel Laskov, Johannes Schneider | Published: 2023-04-30
Cybersecurity
Adversarial Attack Methods
Operational Scenario

SoK: Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning

Authors: Maxwell Standen, Junae Kim, Claudia Szabo | Published: 2023-01-11
DNN IP Protection Method
Adversarial Attack Methods
Structural Attack

Evolution of Neural Tangent Kernels under Benign and Adversarial Training

Authors: Noel Loo, Ramin Hasani, Alexander Amini, Daniela Rus | Published: 2022-10-21
Adversarial Example
Adversarial Attack Methods
Deep Learning Method

New data poison attacks on machine learning classifiers for mobile exfiltration

Authors: Miguel A. Ramirez, Sangyoung Yoon, Ernesto Damiani, Hussam Al Hamadi, Claudio Agostino Ardagna, Nicola Bena, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun | Published: 2022-10-20
Backdoor Attack
Poisoning
Adversarial Attack Methods

Canary in a Coalmine: Better Membership Inference with Ensembled Adversarial Queries

Authors: Yuxin Wen, Arpit Bansal, Hamid Kazemi, Eitan Borgnia, Micah Goldblum, Jonas Geiping, Tom Goldstein | Published: 2022-10-19 | Updated: 2023-06-01
Privacy Assessment
Membership Disclosure Risk
Adversarial Attack Methods

An Empirical Analysis of SMS Scam Detection Systems

Authors: Muhammad Salman, Muhammad Ikram, Mohamed Ali Kaafar | Published: 2022-10-19
Membership Inference
Performance Evaluation
Adversarial Attack Methods

Scaling Adversarial Training to Large Perturbation Bounds

Authors: Sravanti Addepalli, Samyak Jain, Gaurang Sriramanan, R. Venkatesh Babu | Published: 2022-10-18
Adversarial Example
Adversarial Attack Methods
Deep Learning Method

Towards Generating Adversarial Examples on Mixed-type Data

Authors: Han Xu, Menghai Pan, Zhimeng Jiang, Huiyuan Chen, Xiaoting Li, Mahashweta Das, Hao Yang | Published: 2022-10-17
Adversarial Example
Adversarial Attack Methods
Selection and Evaluation of Optimization Algorithms