Poisoning

Semantics-Preserving Adversarial Training

Authors: Wonseok Lee, Hanbit Lee, Sang-goo Lee | Published: 2020-09-23
Poisoning
Robustness
Generative Model

Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version)

Authors: Gautam Raj Mode, Khaza Anuarul Hoque | Published: 2020-09-21 | Updated: 2020-09-28
Poisoning
Adversarial Training
Vulnerability Management

Adversarial Concept Drift Detection under Poisoning Attacks for Robust Data Stream Mining

Authors: Łukasz Korycki, Bartosz Krawczyk | Published: 2020-09-20
Drift Detection Method
Poisoning
Adversarial Attack Detection

Data Poisoning Attacks on Regression Learning and Corresponding Defenses

Authors: Nicolas Michael Müller, Daniel Kowatsch, Konstantin Böttinger | Published: 2020-09-15
Backdoor Attack
Poisoning
Robust Regression

Input Hessian Regularization of Neural Networks

Authors: Waleed Mustafa, Robert A. Vandermeulen, Marius Kloft | Published: 2020-09-14
Poisoning
Robust Regression
Adversarial Training

A Game Theoretic Analysis of Additive Adversarial Attacks and Defenses

Authors: Ambar Pal, René Vidal | Published: 2020-09-14 | Updated: 2020-11-11
Game Theory
Poisoning
Adversarial Training

Quantifying the Preferential Direction of the Model Gradient in Adversarial Training With Projected Gradient Descent

Authors: Ricardo Bigolin Lanfredi, Joyce D. Schroeder, Tolga Tasdizen | Published: 2020-09-10 | Updated: 2023-04-20
Poisoning
Performance Evaluation
Adversarial Attack Methods

A black-box adversarial attack for poisoning clustering

Authors: Antonio Emanuele Cinà, Alessandro Torcinovich, Marcello Pelillo | Published: 2020-09-09 | Updated: 2021-11-10
Backdoor Attack
Poisoning
Content Specialized for Toxicity Attacks

Local and Central Differential Privacy for Robustness and Privacy in Federated Learning

Authors: Mohammad Naseri, Jamie Hayes, Emiliano De Cristofaro | Published: 2020-09-08 | Updated: 2022-05-27
Backdoor Attack
Poisoning
Membership Disclosure Risk

Detection Defense Against Adversarial Attacks with Saliency Map

Authors: Dengpan Ye, Chuanxi Chen, Changrui Liu, Hao Wang, Shunzhi Jiang | Published: 2020-09-06
Poisoning
Adversarial Example
Adversarial Attack Methods