Adversarial Attack Methods

A General Framework for Evaluating Robustness of Combinatorial Optimization Solvers on Graphs

Authors: Han Lu, Zenan Li, Runzhong Wang, Qibing Ren, Junchi Yan, Xiaokang Yang | Published: 2021-12-28 | Updated: 2022-06-04
Algorithm Design
Robustness Evaluation
Adversarial Attack Methods

SoK: A Study of the Security on Voice Processing Systems

Authors: Robert Chang, Logan Kuo, Arthur Liu, Nader Sehatbakhsh | Published: 2021-12-24
Privacy Risk Management
Adversarial Attack Methods
Defense Method

Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach

Authors: James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen | Published: 2021-12-03
Prompt Injection
Malware Detection Method
Adversarial Attack Methods

Adversarial Attacks Against Deep Generative Models on Data: A Survey

Authors: Hui Sun, Tianqing Zhu, Zhiqiu Zhang, Dawei Jin. Ping Xiong, Wanlei Zhou | Published: 2021-12-01
Data Generation
Backdoor Attack
Adversarial Attack Methods

Robust and Information-theoretically Safe Bias Classifier against Adversarial Attacks

Authors: Lijia Yu, Xiao-Shan Gao | Published: 2021-11-08 | Updated: 2022-02-14
Generalization Performance
Adversarial Attack Methods
Defense Mechanism

Get a Model! Model Hijacking Attack Against Machine Learning Models

Authors: Ahmed Salem, Michael Backes, Yang Zhang | Published: 2021-11-08
Dataset evaluation
Backdoor Attack
Adversarial Attack Methods

Adversarial Attacks on Graph Classification via Bayesian Optimisation

Authors: Xingchen Wan, Henry Kenlay, Binxin Ru, Arno Blaas, Michael A. Osborne, Xiaowen Dong | Published: 2021-11-04
Explainability of Graph Machine Learning
Poisoning
Adversarial Attack Methods

Multi-concept adversarial attacks

Authors: Vibha Belavadi, Yan Zhou, Murat Kantarcioglu, Bhavani M. Thuraisingham | Published: 2021-10-19
Membership Inference
Robustness Evaluation
Adversarial Attack Methods

Poisoning Attacks on Fair Machine Learning

Authors: Minh-Hao Van, Wei Du, Xintao Wu, Aidong Lu | Published: 2021-10-17
Adversarial Attack Methods
Machine Learning Algorithm

Adversarial Attacks on Gaussian Process Bandits

Authors: Eric Han, Jonathan Scarlett | Published: 2021-10-16 | Updated: 2022-06-16
Algorithm Design
Trade-off Analysis
Adversarial Attack Methods