Defense Method

Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters

Authors: Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg | Published: 2020-04-07
Competitive Cooperative Systems
Computational Efficiency
Defense Method

An Overview of Federated Deep Learning Privacy Attacks and Defensive Strategies

Authors: David Enthoven, Zaid Al-Ars | Published: 2020-04-01
Poisoning
Attack Evaluation
Defense Method

Adversarial Perturbations Fool Deepfake Detectors

Authors: Apurva Gandhi, Shomik Jain | Published: 2020-03-24 | Updated: 2020-05-15
Adversarial Example
Adversarial Attack Methods
Defense Method

Systematic Evaluation of Privacy Risks of Machine Learning Models

Authors: Liwei Song, Prateek Mittal | Published: 2020-03-24 | Updated: 2020-12-09
Privacy Protection Method
Membership Inference
Defense Method

Certified Defenses for Adversarial Patches

Authors: Ping-Yeh Chiang, Renkun Ni, Ahmed Abdelkader, Chen Zhu, Christoph Studer, Tom Goldstein | Published: 2020-03-14 | Updated: 2020-09-25
Robustness
Vulnerability Attack Method
Defense Method

A Survey of Adversarial Learning on Graphs

Authors: Liang Chen, Jintang Li, Jiaying Peng, Tao Xie, Zengxu Cao, Kun Xu, Xiangnan He, Zibin Zheng, Bingzhe Wu | Published: 2020-03-10 | Updated: 2022-04-05
Poisoning
Adversarial Attack Methods
Defense Method

Dynamic Backdoor Attacks Against Machine Learning Models

Authors: Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang | Published: 2020-03-07 | Updated: 2022-03-03
Poisoning
Content Specialized for Toxicity Attacks
Defense Method

Confusing and Detecting ML Adversarial Attacks with Injected Attractors

Authors: Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee | Published: 2020-03-05 | Updated: 2021-03-08
Adversarial Perturbation Techniques
Watermarking Technology
Defense Method

Denoised Smoothing: A Provable Defense for Pretrained Classifiers

Authors: Hadi Salman, Mingjie Sun, Greg Yang, Ashish Kapoor, J. Zico Kolter | Published: 2020-03-04 | Updated: 2020-09-21
Training Method
Robustness Evaluation
Defense Method

Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks

Authors: Francesco Croce, Matthias Hein | Published: 2020-03-03 | Updated: 2020-08-04
Robustness Evaluation
Adversarial Perturbation Techniques
Defense Method