Poisoning

Diversity can be Transferred: Output Diversification for White- and Black-box Attacks

Authors: Yusuke Tashiro, Yang Song, Stefano Ermon | Published: 2020-03-15 | Updated: 2020-10-30
Poisoning
Adversarial Attack Methods
Vulnerability Attack Method

A Survey of Adversarial Learning on Graphs

Authors: Liang Chen, Jintang Li, Jiaying Peng, Tao Xie, Zengxu Cao, Kun Xu, Xiangnan He, Zibin Zheng, Bingzhe Wu | Published: 2020-03-10 | Updated: 2022-04-05
Poisoning
Adversarial Attack Methods
Defense Method

Security of Distributed Machine Learning: A Game-Theoretic Approach to Design Secure DSVM

Authors: Rui Zhang, Quanyan Zhu | Published: 2020-03-08 | Updated: 2020-04-26
Game Theory
Poisoning
Adversarial Attack Methods

Dynamic Backdoor Attacks Against Machine Learning Models

Authors: Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang | Published: 2020-03-07 | Updated: 2022-03-03
Poisoning
Content Specialized for Toxicity Attacks
Defense Method

Adversarial Attacks and Defenses on Graphs: A Review, A Tool and Empirical Studies

Authors: Wei Jin, Yaxin Li, Han Xu, Yiqi Wang, Shuiwang Ji, Charu Aggarwal, Jiliang Tang | Published: 2020-03-02 | Updated: 2020-12-12
Poisoning
Adversarial Example
Adversarial Learning

Regularisation Can Mitigate Poisoning Attacks: A Novel Analysis Based on Multiobjective Bilevel Optimisation

Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2020-02-28 | Updated: 2020-06-20
Hyperparameter Optimization
Poisoning
Robustness Evaluation

Towards Backdoor Attacks and Defense in Robust Machine Learning Models

Authors: Ezekiel Soremekun, Sakshi Udeshi, Sudipta Chattopadhyay | Published: 2020-02-25 | Updated: 2023-01-11
Backdoor Attack
Poisoning
Robustness Evaluation

Influence Function based Data Poisoning Attacks to Top-N Recommender Systems

Authors: Minghong Fang, Neil Zhenqiang Gong, Jia Liu | Published: 2020-02-19 | Updated: 2020-05-31
Poisoning
Maximum Coverage Problem
Threat modeling

Deflecting Adversarial Attacks

Authors: Yao Qin, Nicholas Frosst, Colin Raffel, Garrison Cottrell, Geoffrey Hinton | Published: 2020-02-18
Poisoning
Adversarial Attack Detection
Defense Method

Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets

Authors: Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey, Xingjun Ma | Published: 2020-02-14
Poisoning
Adversarial Attack Detection
Defense Method