A General Framework for Evaluating Robustness of Combinatorial Optimization Solvers on Graphs Authors: Han Lu, Zenan Li, Runzhong Wang, Qibing Ren, Junchi Yan, Xiaokang Yang | Published: 2021-12-28 | Updated: 2022-06-04 Algorithm DesignRobustness EvaluationAdversarial Attack Methods 2021.12.28 2025.05.28 Literature Database
SoK: A Study of the Security on Voice Processing Systems Authors: Robert Chang, Logan Kuo, Arthur Liu, Nader Sehatbakhsh | Published: 2021-12-24 Privacy Risk ManagementAdversarial Attack MethodsDefense Method 2021.12.24 2025.05.28 Literature Database
Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach Authors: James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen | Published: 2021-12-03 Prompt InjectionMalware Detection MethodAdversarial Attack Methods 2021.12.03 2025.05.28 Literature Database
Adversarial Attacks Against Deep Generative Models on Data: A Survey Authors: Hui Sun, Tianqing Zhu, Zhiqiu Zhang, Dawei Jin. Ping Xiong, Wanlei Zhou | Published: 2021-12-01 Data GenerationBackdoor AttackAdversarial Attack Methods 2021.12.01 2025.05.28 Literature Database
Robust and Information-theoretically Safe Bias Classifier against Adversarial Attacks Authors: Lijia Yu, Xiao-Shan Gao | Published: 2021-11-08 | Updated: 2022-02-14 Generalization PerformanceAdversarial Attack MethodsDefense Mechanism 2021.11.08 2025.05.28 Literature Database
Get a Model! Model Hijacking Attack Against Machine Learning Models Authors: Ahmed Salem, Michael Backes, Yang Zhang | Published: 2021-11-08 Dataset evaluationBackdoor AttackAdversarial Attack Methods 2021.11.08 2025.05.28 Literature Database
Adversarial Attacks on Graph Classification via Bayesian Optimisation Authors: Xingchen Wan, Henry Kenlay, Binxin Ru, Arno Blaas, Michael A. Osborne, Xiaowen Dong | Published: 2021-11-04 Explainability of Graph Machine LearningPoisoningAdversarial Attack Methods 2021.11.04 2025.05.28 Literature Database
Multi-concept adversarial attacks Authors: Vibha Belavadi, Yan Zhou, Murat Kantarcioglu, Bhavani M. Thuraisingham | Published: 2021-10-19 Membership InferenceRobustness EvaluationAdversarial Attack Methods 2021.10.19 2025.05.28 Literature Database
Poisoning Attacks on Fair Machine Learning Authors: Minh-Hao Van, Wei Du, Xintao Wu, Aidong Lu | Published: 2021-10-17 Adversarial Attack MethodsMachine Learning Algorithm 2021.10.17 2025.05.28 Literature Database
Adversarial Attacks on Gaussian Process Bandits Authors: Eric Han, Jonathan Scarlett | Published: 2021-10-16 | Updated: 2022-06-16 Algorithm DesignTrade-off AnalysisAdversarial Attack Methods 2021.10.16 2025.05.28 Literature Database