Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems Authors: Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury | Published: 2020-04-10 Attack EvaluationAttack DetectionDefense Method 2020.04.10 2025.05.28 Literature Database
TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems Authors: Ka-Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu | Published: 2020-04-09 Attack EvaluationVulnerability Assessment MethodDefense Method 2020.04.09 2025.05.28 Literature Database
Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters Authors: Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg | Published: 2020-04-07 Competitive Cooperative SystemsComputational EfficiencyDefense Method 2020.04.07 2025.05.28 Literature Database
An Overview of Federated Deep Learning Privacy Attacks and Defensive Strategies Authors: David Enthoven, Zaid Al-Ars | Published: 2020-04-01 PoisoningAttack EvaluationDefense Method 2020.04.01 2025.05.28 Literature Database
Adversarial Perturbations Fool Deepfake Detectors Authors: Apurva Gandhi, Shomik Jain | Published: 2020-03-24 | Updated: 2020-05-15 Adversarial ExampleAdversarial Attack MethodsDefense Method 2020.03.24 2025.05.28 Literature Database
Systematic Evaluation of Privacy Risks of Machine Learning Models Authors: Liwei Song, Prateek Mittal | Published: 2020-03-24 | Updated: 2020-12-09 Privacy Protection MethodMembership InferenceDefense Method 2020.03.24 2025.05.28 Literature Database
Certified Defenses for Adversarial Patches Authors: Ping-Yeh Chiang, Renkun Ni, Ahmed Abdelkader, Chen Zhu, Christoph Studer, Tom Goldstein | Published: 2020-03-14 | Updated: 2020-09-25 RobustnessVulnerability Attack MethodDefense Method 2020.03.14 2025.05.28 Literature Database
A Survey of Adversarial Learning on Graphs Authors: Liang Chen, Jintang Li, Jiaying Peng, Tao Xie, Zengxu Cao, Kun Xu, Xiangnan He, Zibin Zheng, Bingzhe Wu | Published: 2020-03-10 | Updated: 2022-04-05 PoisoningAdversarial Attack MethodsDefense Method 2020.03.10 2025.05.28 Literature Database
Dynamic Backdoor Attacks Against Machine Learning Models Authors: Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang | Published: 2020-03-07 | Updated: 2022-03-03 PoisoningContent Specialized for Toxicity AttacksDefense Method 2020.03.07 2025.05.28 Literature Database
Confusing and Detecting ML Adversarial Attacks with Injected Attractors Authors: Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee | Published: 2020-03-05 | Updated: 2021-03-08 Adversarial Perturbation TechniquesWatermarking TechnologyDefense Method 2020.03.05 2025.05.28 Literature Database