Building Robust Ensembles via Margin Boosting Authors: Dinghuai Zhang, Hongyang Zhang, Aaron Courville, Yoshua Bengio, Pradeep Ravikumar, Arun Sai Suggala | Published: 2022-06-07 PoisoningRobustnessAdversarial Attack Methods 2022.06.07 2025.05.28 Literature Database
Improving Adversarial Robustness by Putting More Regularizations on Less Robust Samples Authors: Dongyoon Yang, Insung Kong, Yongdai Kim | Published: 2022-06-07 | Updated: 2023-06-01 RobustnessAdversarial ExampleAdversarial Attack Methods 2022.06.07 2025.05.28 Literature Database
White-box Membership Attack Against Machine Learning Based Retinopathy Classification Authors: Mounia Hamidouche, Reda Bellafqira, Gwenolé Quellec, Gouenou Coatrieux | Published: 2022-05-30 Attack Methods against DFLAdversarial Attack Methods 2022.05.30 2025.05.28 Literature Database
Adversarial attacks and defenses in Speaker Recognition Systems: A survey Authors: Jiahe Lan, Rui Zhang, Zheng Yan, Jie Wang, Yu Chen, Ronghui Hou | Published: 2022-05-27 Adversarial ExampleAdversarial Attack MethodsSpeech Recognition Process 2022.05.27 2025.05.28 Literature Database
A General Framework for Evaluating Robustness of Combinatorial Optimization Solvers on Graphs Authors: Han Lu, Zenan Li, Runzhong Wang, Qibing Ren, Junchi Yan, Xiaokang Yang | Published: 2021-12-28 | Updated: 2022-06-04 Algorithm DesignRobustness EvaluationAdversarial Attack Methods 2021.12.28 2025.05.28 Literature Database
SoK: A Study of the Security on Voice Processing Systems Authors: Robert Chang, Logan Kuo, Arthur Liu, Nader Sehatbakhsh | Published: 2021-12-24 Privacy Risk ManagementAdversarial Attack MethodsDefense Method 2021.12.24 2025.05.28 Literature Database
Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach Authors: James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen | Published: 2021-12-03 Prompt InjectionMalware Detection MethodAdversarial Attack Methods 2021.12.03 2025.05.28 Literature Database
Adversarial Attacks Against Deep Generative Models on Data: A Survey Authors: Hui Sun, Tianqing Zhu, Zhiqiu Zhang, Dawei Jin. Ping Xiong, Wanlei Zhou | Published: 2021-12-01 Data GenerationBackdoor AttackAdversarial Attack Methods 2021.12.01 2025.05.28 Literature Database
Robust and Information-theoretically Safe Bias Classifier against Adversarial Attacks Authors: Lijia Yu, Xiao-Shan Gao | Published: 2021-11-08 | Updated: 2022-02-14 Generalization PerformanceAdversarial Attack MethodsDefense Mechanism 2021.11.08 2025.05.28 Literature Database
Get a Model! Model Hijacking Attack Against Machine Learning Models Authors: Ahmed Salem, Michael Backes, Yang Zhang | Published: 2021-11-08 Dataset evaluationBackdoor AttackAdversarial Attack Methods 2021.11.08 2025.05.28 Literature Database