Constructing Semantics-Aware Adversarial Examples with a Probabilistic Perspective Authors: Andi Zhang, Mingtian Zhang, Damon Wischik | Published: 2023-06-01 | Updated: 2024-11-24 PoisoningDiffusion ModelAdversarial Attack Methods 2023.06.01 2025.05.28 Literature Database
Verifiable Learning for Robust Tree Ensembles Authors: Stefano Calzavara, Lorenzo Cazzaro, Giulio Ermanno Pibiri, Nicola Prezza | Published: 2023-05-05 | Updated: 2023-11-11 Random ForestAdversarial Attack MethodsDecision Tree 2023.05.05 2025.05.28 Literature Database
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection Authors: Giovanni Apruzzese, Pavel Laskov, Johannes Schneider | Published: 2023-04-30 CybersecurityAdversarial Attack MethodsOperational Scenario 2023.04.30 2025.05.28 Literature Database
SoK: Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning Authors: Maxwell Standen, Junae Kim, Claudia Szabo | Published: 2023-01-11 DNN IP Protection MethodAdversarial Attack MethodsStructural Attack 2023.01.11 2025.05.28 Literature Database
Evolution of Neural Tangent Kernels under Benign and Adversarial Training Authors: Noel Loo, Ramin Hasani, Alexander Amini, Daniela Rus | Published: 2022-10-21 Adversarial ExampleAdversarial Attack MethodsDeep Learning Method 2022.10.21 2025.05.28 Literature Database
New data poison attacks on machine learning classifiers for mobile exfiltration Authors: Miguel A. Ramirez, Sangyoung Yoon, Ernesto Damiani, Hussam Al Hamadi, Claudio Agostino Ardagna, Nicola Bena, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun | Published: 2022-10-20 Backdoor AttackPoisoningAdversarial Attack Methods 2022.10.20 2025.05.28 Literature Database
Canary in a Coalmine: Better Membership Inference with Ensembled Adversarial Queries Authors: Yuxin Wen, Arpit Bansal, Hamid Kazemi, Eitan Borgnia, Micah Goldblum, Jonas Geiping, Tom Goldstein | Published: 2022-10-19 | Updated: 2023-06-01 Privacy AssessmentMembership Disclosure RiskAdversarial Attack Methods 2022.10.19 2025.05.28 Literature Database
An Empirical Analysis of SMS Scam Detection Systems Authors: Muhammad Salman, Muhammad Ikram, Mohamed Ali Kaafar | Published: 2022-10-19 Membership InferencePerformance EvaluationAdversarial Attack Methods 2022.10.19 2025.05.28 Literature Database
Scaling Adversarial Training to Large Perturbation Bounds Authors: Sravanti Addepalli, Samyak Jain, Gaurang Sriramanan, R. Venkatesh Babu | Published: 2022-10-18 Adversarial ExampleAdversarial Attack MethodsDeep Learning Method 2022.10.18 2025.05.28 Literature Database
Towards Generating Adversarial Examples on Mixed-type Data Authors: Han Xu, Menghai Pan, Zhimeng Jiang, Huiyuan Chen, Xiaoting Li, Mahashweta Das, Hao Yang | Published: 2022-10-17 Adversarial ExampleAdversarial Attack MethodsSelection and Evaluation of Optimization Algorithms 2022.10.17 2025.05.28 Literature Database