ONION: A Simple and Effective Defense Against Textual Backdoor Attacks Authors: Fanchao Qi, Yangyi Chen, Mukai Li, Yuan Yao, Zhiyuan Liu, Maosong Sun | Published: 2020-11-20 | Updated: 2021-11-03 Text Perturbation MethodTrigger DetectionBackdoor Detection 2020.11.20 2025.05.28 Literature Database
Eternal Sunshine of the Spotless Net: Selective Forgetting in Deep Networks Authors: Aditya Golatkar, Alessandro Achille, Stefano Soatto | Published: 2019-11-12 | Updated: 2020-03-31 Trigger DetectionMachine learningInformation Security 2019.11.12 2025.05.28 Literature Database
Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems Authors: Bao Gia Doan, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2019-08-09 | Updated: 2020-09-28 Trigger DetectionTrojan DetectionBackdoor Detection 2019.08.09 2025.05.28 Literature Database
Scaling up the randomized gradient-free adversarial attack reveals overestimation of robustness using established attacks Authors: Francesco Croce, Jonas Rauber, Matthias Hein | Published: 2019-03-27 | Updated: 2019-09-25 Trigger DetectionAdversarial LearningAdversarial Attack Detection 2019.03.27 2025.05.28 Literature Database
STRIP: A Defence Against Trojan Attacks on Deep Neural Networks Authors: Yansong Gao, Chang Xu, Derui Wang, Shiping Chen, Damith C. Ranasinghe, Surya Nepal | Published: 2019-02-18 | Updated: 2020-01-17 Trigger DetectionTrojan DetectionBackdoor Detection 2019.02.18 2025.05.28 Literature Database
Discretization based Solutions for Secure Machine Learning against Adversarial Attacks Authors: Priyadarshini Panda, Indranil Chakraborty, Kaushik Roy | Published: 2019-02-08 | Updated: 2019-02-11 Trigger DetectionCertified RobustnessRobustness Improvement Method 2019.02.08 2025.05.28 Literature Database
Universal Rules for Fooling Deep Neural Networks based Text Classification Authors: Di Li, Danilo Vasconcellos Vargas, Sakurai Kouichi | Published: 2019-01-22 | Updated: 2019-04-03 Trigger DetectionAdversarial ExampleDeep Learning Method 2019.01.22 2025.05.28 Literature Database
ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System Authors: Huangxun Chen, Chenyu Huang, Qianyi Huang, Qian Zhang, Wei Wang | Published: 2019-01-12 | Updated: 2020-01-14 Trigger DetectionModel EvaluationAdversarial Attack Methods 2019.01.12 2025.05.28 Literature Database
RF Jamming Classification using Relative Speed Estimation in Vehicular Wireless Networks Authors: Dimitrios Kosmanos, Dimitrios Karagiannis, Antonios Argyriou, Spyros Lalis, Leandros Maglaras | Published: 2018-12-31 RF Attack Detection MethodRician Fading ModelTrigger Detection 2018.12.31 2025.05.28 Literature Database
Reaching Data Confidentiality and Model Accountability on the CalTrain Authors: Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian Molloy | Published: 2018-12-07 Trigger DetectionPerformance EvaluationFederated Learning 2018.12.07 2025.05.28 Literature Database