One Parameter Defense — Defending against Data Inference Attacks via Differential Privacy Authors: Dayong Ye, Sheng Shen, Tianqing Zhu, Bo Liu, Wanlei Zhou | Published: 2022-03-13 Privacy Enhancing TechnologyMembership InferenceDefense Method 2022.03.13 2025.05.28 Literature Database
An integrated Auto Encoder-Block Switching defense approach to prevent adversarial attacks Authors: Anirudh Yadav, Ashutosh Upadhyay, S. Sharanya | Published: 2022-03-11 Training Data GenerationAdversarial ExampleDefense Method 2022.03.11 2025.05.28 Literature Database
Towards Efficient Data-Centric Robust Machine Learning with Noise-based Augmentation Authors: Xiaogeng Liu, Haoyu Wang, Yechao Zhang, Fangzhou Wu, Shengshan Hu | Published: 2022-03-08 Data GenerationRobustness EvaluationDefense Method 2022.03.08 2025.05.28 Literature Database
Adversarial Patterns: Building Robust Android Malware Classifiers Authors: Dipkamal Bhusal, Nidhi Rastogi | Published: 2022-03-04 | Updated: 2024-04-12 Malware ClassificationAdversarial ExampleDefense Method 2022.03.04 2025.05.28 Literature Database
Adversarial attacks on neural networks through canonical Riemannian foliations Authors: Eliot Tron, Nicolas Couellan, Stéphane Puechmorel | Published: 2022-03-02 | Updated: 2024-09-18 RobustnessSelection and Evaluation of Optimization AlgorithmsDefense Method 2022.03.02 2025.05.28 Literature Database
Understanding and Improving Graph Injection Attack by Promoting Unnoticeability Authors: Yongqiang Chen, Han Yang, Yonggang Zhang, Kaili Ma, Tongliang Liu, Bo Han, James Cheng | Published: 2022-02-16 | Updated: 2022-04-05 PoisoningMalicious Node InjectionDefense Method 2022.02.16 2025.05.28 Literature Database
StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection Authors: Aqib Rashid, Jose Such | Published: 2022-02-15 | Updated: 2023-04-24 Prompt InjectionModel Selection MethodDefense Method 2022.02.15 2025.05.28 Literature Database
Holistic Adversarial Robustness of Deep Learning Models Authors: Pin-Yu Chen, Sijia Liu | Published: 2022-02-15 | Updated: 2023-01-05 PoisoningAdversarial Attack DetectionDefense Method 2022.02.15 2025.05.28 Literature Database
Membership Inference Attacks and Defenses in Neural Network Pruning Authors: Xiaoyong Yuan, Lan Zhang | Published: 2022-02-07 | Updated: 2022-08-03 Privacy Risk ManagementMembership Disclosure RiskDefense Method 2022.02.07 2025.05.28 Literature Database
Pixle: a fast and effective black-box attack based on rearranging pixels Authors: Jary Pomponi, Simone Scardapane, Aurelio Uncini | Published: 2022-02-04 Adversarial Attack DetectionVulnerability Attack MethodDefense Method 2022.02.04 2025.05.28 Literature Database