Adversarial attacks on neural networks through canonical Riemannian foliations Authors: Eliot Tron, Nicolas Couellan, Stéphane Puechmorel | Published: 2022-03-02 | Updated: 2024-09-18 RobustnessSelection and Evaluation of Optimization AlgorithmsDefense Method 2022.03.02 2025.05.28 Literature Database
Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks Authors: Dmitrii Usynin, Daniel Rueckert, Georgios Kaissis | Published: 2022-03-01 Style Reconstruction PenaltyModel ArchitectureSelection and Evaluation of Optimization Algorithms 2022.03.01 2025.05.28 Literature Database
PopSkipJump: Decision-Based Attack for Probabilistic Classifiers Authors: Carl-Johann Simon-Gabriel, Noman Ahmed Sheikh, Andreas Krause | Published: 2021-06-14 Adversarial Attack MethodsSelection and Evaluation of Optimization AlgorithmsDefense Mechanism 2021.06.14 2025.05.28 Literature Database
Stochastic Alternating Direction Method of Multipliers for Byzantine-Robust Distributed Learning Authors: Feng Lin, Weiyu Li, Qing Ling | Published: 2021-06-13 Efficiency of Distributed LearningConvergence analysisSelection and Evaluation of Optimization Algorithms 2021.06.13 2025.05.28 Literature Database
BODAME: Bilevel Optimization for Defense Against Model Extraction Authors: Yuto Mori, Atsushi Nitanda, Akiko Takeda | Published: 2021-03-11 Model Performance EvaluationAdversarial attackSelection and Evaluation of Optimization Algorithms 2021.03.11 2025.05.28 Literature Database
Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams Authors: Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David Wagner | Published: 2020-11-19 | Updated: 2021-11-01 Performance EvaluationAdversarial attackSelection and Evaluation of Optimization Algorithms 2020.11.19 2025.05.28 Literature Database
The Cost of Privacy in Generalized Linear Models: Algorithms and Minimax Lower Bounds Authors: T. Tony Cai, Yichen Wang, Linjun Zhang | Published: 2020-11-08 | Updated: 2020-12-06 Data Privacy AssessmentPerformance EvaluationSelection and Evaluation of Optimization Algorithms 2020.11.08 2025.05.28 Literature Database
Improving Query Efficiency of Black-box Adversarial Attack Authors: Yang Bai, Yuyuan Zeng, Yong Jiang, Yisen Wang, Shu-Tao Xia, Weiwei Guo | Published: 2020-09-24 | Updated: 2020-09-25 Performance EvaluationSelection and Evaluation of Optimization AlgorithmsGenerative Model 2020.09.24 2025.05.28 Literature Database
Detection of Iterative Adversarial Attacks via Counter Attack Authors: Matthias Rottmann, Kira Maag, Mathis Peyron, Natasa Krejic, Hanno Gottschalk | Published: 2020-09-23 | Updated: 2021-03-23 RobustnessInformation SecuritySelection and Evaluation of Optimization Algorithms 2020.09.23 2025.05.28 Literature Database
Puzzle Mix: Exploiting Saliency and Local Statistics for Optimal Mixup Authors: Jang-Hyun Kim, Wonho Choo, Hyun Oh Song | Published: 2020-09-15 | Updated: 2020-12-30 Data GenerationSelection and Evaluation of Optimization AlgorithmsMachine Learning 2020.09.15 2025.05.28 Literature Database