Adversarial Attack Methods

Adversarial Attacks on Graph Classification via Bayesian Optimisation

Authors: Xingchen Wan, Henry Kenlay, Binxin Ru, Arno Blaas, Michael A. Osborne, Xiaowen Dong | Published: 2021-11-04
Explainability of Graph Machine Learning
Poisoning
Adversarial Attack Methods

Multi-concept adversarial attacks

Authors: Vibha Belavadi, Yan Zhou, Murat Kantarcioglu, Bhavani M. Thuraisingham | Published: 2021-10-19
Membership Inference
Robustness Evaluation
Adversarial Attack Methods

Poisoning Attacks on Fair Machine Learning

Authors: Minh-Hao Van, Wei Du, Xintao Wu, Aidong Lu | Published: 2021-10-17
Adversarial Attack Methods
Machine Learning Algorithm

Adversarial Attacks on Gaussian Process Bandits

Authors: Eric Han, Jonathan Scarlett | Published: 2021-10-16 | Updated: 2022-06-16
Algorithm Design
Trade-off Analysis
Adversarial Attack Methods

Adversarial Attacks on ML Defense Models Competition

Authors: Yinpeng Dong, Qi-An Fu, Xiao Yang, Wenzhao Xiang, Tianyu Pang, Hang Su, Jun Zhu, Jiayu Tang, Yuefeng Chen, XiaoFeng Mao, Yuan He, Hui Xue, Chao Li, Ye Liu, Qilong Zhang, Lianli Gao, Yunrui Yu, Xitong Gao, Zhe Zhao, Daquan Lin, Jiadong Lin, Chuanbiao Song, Zihao Wang, Zhennan Wu, Yang Guo, Jiequan Cui, Xiaogang Xu, Pengguang Chen | Published: 2021-10-15
Robustness Evaluation
Adversarial Example
Adversarial Attack Methods

Bandwidth Utilization Side-Channel on ML Inference Accelerators

Authors: Sarbartha Banerjee, Shijia Wei, Prakash Ramrakhyani, Mohit Tiwari | Published: 2021-10-14
Resource Consumption Analysis
Adversarial Attack Methods
Machine Learning Algorithm

Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks

Authors: Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao | Published: 2021-10-13 | Updated: 2022-06-15
Backdoor Attack
Forensic Report
Adversarial Attack Methods

On the Security Risks of AutoML

Authors: Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2021-10-12
Membership Inference
Model Selection
Adversarial Attack Methods

Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability

Authors: Bilel Tarchoun, Ihsen Alouani, Anouar Ben Khalifa, Mohamed Ali Mahjoub | Published: 2021-10-10
Data Generation
Adversarial Attack Methods
Physical attack

Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks

Authors: Hanxun Huang, Yisen Wang, Sarah Monazam Erfani, Quanquan Gu, James Bailey, Xingjun Ma | Published: 2021-10-07 | Updated: 2022-01-23
Robustness Evaluation
Adversarial Example
Adversarial Attack Methods