Defense Method

Understanding and Improving Graph Injection Attack by Promoting Unnoticeability

Authors: Yongqiang Chen, Han Yang, Yonggang Zhang, Kaili Ma, Tongliang Liu, Bo Han, James Cheng | Published: 2022-02-16 | Updated: 2022-04-05
Poisoning
Malicious Node Injection
Defense Method

StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection

Authors: Aqib Rashid, Jose Such | Published: 2022-02-15 | Updated: 2023-04-24
Prompt Injection
Model Selection Method
Defense Method

Holistic Adversarial Robustness of Deep Learning Models

Authors: Pin-Yu Chen, Sijia Liu | Published: 2022-02-15 | Updated: 2023-01-05
Poisoning
Adversarial Attack Detection
Defense Method

Membership Inference Attacks and Defenses in Neural Network Pruning

Authors: Xiaoyong Yuan, Lan Zhang | Published: 2022-02-07 | Updated: 2022-08-03
Privacy Risk Management
Membership Disclosure Risk
Defense Method

Pixle: a fast and effective black-box attack based on rearranging pixels

Authors: Jary Pomponi, Simone Scardapane, Aurelio Uncini | Published: 2022-02-04
Adversarial Attack Detection
Vulnerability Attack Method
Defense Method

SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders

Authors: Tianshuo Cong, Xinlei He, Yang Zhang | Published: 2022-01-27 | Updated: 2022-08-31
Watermarking
Membership Inference
Defense Method

Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning

Authors: Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang | Published: 2021-12-29 | Updated: 2022-10-07
Backdoor Attack
Poisoning
Defense Method

SoK: A Study of the Security on Voice Processing Systems

Authors: Robert Chang, Logan Kuo, Arthur Liu, Nader Sehatbakhsh | Published: 2021-12-24
Privacy Risk Management
Adversarial Attack Methods
Defense Method

Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems

Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza | Published: 2021-12-22
Poisoning
Adversarial Learning
Defense Method

A Theoretical View of Linear Backpropagation and Its Convergence

Authors: Ziang Li, Yiwen Guo, Haodi Liu, Changshui Zhang | Published: 2021-12-21 | Updated: 2024-01-10
Model Design
Convergence Analysis
Defense Method