Defense Method

One Parameter Defense — Defending against Data Inference Attacks via Differential Privacy

Authors: Dayong Ye, Sheng Shen, Tianqing Zhu, Bo Liu, Wanlei Zhou | Published: 2022-03-13
Privacy Enhancing Technology
Membership Inference
Defense Method

An integrated Auto Encoder-Block Switching defense approach to prevent adversarial attacks

Authors: Anirudh Yadav, Ashutosh Upadhyay, S. Sharanya | Published: 2022-03-11
Training Data Generation
Adversarial Example
Defense Method

Towards Efficient Data-Centric Robust Machine Learning with Noise-based Augmentation

Authors: Xiaogeng Liu, Haoyu Wang, Yechao Zhang, Fangzhou Wu, Shengshan Hu | Published: 2022-03-08
Data Generation
Robustness Evaluation
Defense Method

Adversarial Patterns: Building Robust Android Malware Classifiers

Authors: Dipkamal Bhusal, Nidhi Rastogi | Published: 2022-03-04 | Updated: 2024-04-12
Malware Classification
Adversarial Example
Defense Method

Adversarial attacks on neural networks through canonical Riemannian foliations

Authors: Eliot Tron, Nicolas Couellan, Stéphane Puechmorel | Published: 2022-03-02 | Updated: 2024-09-18
Robustness
Selection and Evaluation of Optimization Algorithms
Defense Method

Understanding and Improving Graph Injection Attack by Promoting Unnoticeability

Authors: Yongqiang Chen, Han Yang, Yonggang Zhang, Kaili Ma, Tongliang Liu, Bo Han, James Cheng | Published: 2022-02-16 | Updated: 2022-04-05
Poisoning
Malicious Node Injection
Defense Method

StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection

Authors: Aqib Rashid, Jose Such | Published: 2022-02-15 | Updated: 2023-04-24
Prompt Injection
Model Selection Method
Defense Method

Holistic Adversarial Robustness of Deep Learning Models

Authors: Pin-Yu Chen, Sijia Liu | Published: 2022-02-15 | Updated: 2023-01-05
Poisoning
Adversarial Attack Detection
Defense Method

Membership Inference Attacks and Defenses in Neural Network Pruning

Authors: Xiaoyong Yuan, Lan Zhang | Published: 2022-02-07 | Updated: 2022-08-03
Privacy Risk Management
Membership Disclosure Risk
Defense Method

Pixle: a fast and effective black-box attack based on rearranging pixels

Authors: Jary Pomponi, Simone Scardapane, Aurelio Uncini | Published: 2022-02-04
Adversarial Attack Detection
Vulnerability Attack Method
Defense Method