PopSkipJump: Decision-Based Attack for Probabilistic Classifiers Authors: Carl-Johann Simon-Gabriel, Noman Ahmed Sheikh, Andreas Krause | Published: 2021-06-14 Adversarial Attack MethodsSelection and Evaluation of Optimization AlgorithmsDefense Mechanism 2021.06.14 2025.05.28 Literature Database
Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction Authors: Ferhat Ozgur Catak, Evren Catak, Murat Kuzlu, Umit Cali, Devrim Unal | Published: 2021-05-09 | Updated: 2021-07-23 Adversarial Attack MethodsOptimization ProblemDeep Learning Method 2021.05.09 2025.05.28 Literature Database
Learning Image Attacks toward Vision Guided Autonomous Vehicles Authors: Hyung-Jin Yoon, Hamidreza Jafarnejadsani, Petros Voulgaris | Published: 2021-05-09 | Updated: 2021-05-17 Adversarial Attack MethodsState Estimation MethodGenerative Adversarial Network 2021.05.09 2025.05.28 Literature Database
Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions Authors: Michael Goebel, Jason Bunk, Srinjoy Chattopadhyay, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath | Published: 2021-03-19 Data Extraction and AnalysisPoisoningAdversarial Attack Methods 2021.03.19 2025.05.28 Literature Database
LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial Attack Authors: Ashkan Esmaeili, Marzieh Edraki, Nazanin Rahnavard, Mubarak Shah, Ajmal Mian | Published: 2021-03-19 | Updated: 2021-03-22 Adversarial Attack MethodsOptimization ProblemDeep Learning Technology 2021.03.19 2025.05.28 Literature Database
Resilient Cooperative Adaptive Cruise Control for Autonomous Vehicles Using Machine Learning Authors: Srivalli Boddupalli, Akash Someshwar Rao, Sandip Ray | Published: 2021-03-18 Attack DetectionAdversarial Attack MethodsRole of Machine Learning 2021.03.18 2025.05.28 Literature Database
Simeon — Secure Federated Machine Learning Through Iterative Filtering Authors: Nicholas Malecki, Hye-young Paik, Aleksandar Ignjatovic, Alan Blair, Elisa Bertino | Published: 2021-03-13 Backdoor Attack TechniquesByzantine Consensus MechanismAdversarial Attack Methods 2021.03.13 2025.05.28 Literature Database
On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models Authors: Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar, Darren Webb, Peter Dickinson | Published: 2021-03-12 Membership InferenceAdversarial Attack MethodsOverfitting and Memorization 2021.03.12 2025.05.28 Literature Database
Adversarial attacks in consensus-based multi-agent reinforcement learning Authors: Martin Figura, Krishna Chaitanya Kosaraju, Vijay Gupta | Published: 2021-03-11 Multi-Agent Reinforcement LearningConvergence AnalysisAdversarial Attack Methods 2021.03.11 2025.05.28 Literature Database
Exacerbating Algorithmic Bias through Fairness Attacks Authors: Ninareh Mehrabi, Muhammad Naveed, Fred Morstatter, Aram Galstyan | Published: 2020-12-16 Taxonomy of AttacksAdversarial Attack MethodsRole of Machine Learning 2020.12.16 2025.05.28 Literature Database