Towards Backdoor Attacks and Defense in Robust Machine Learning Models Authors: Ezekiel Soremekun, Sakshi Udeshi, Sudipta Chattopadhyay | Published: 2020-02-25 | Updated: 2023-01-11 Backdoor AttackPoisoningRobustness Evaluation 2020.02.25 2025.05.28 Literature Database
Influence Function based Data Poisoning Attacks to Top-N Recommender Systems Authors: Minghong Fang, Neil Zhenqiang Gong, Jia Liu | Published: 2020-02-19 | Updated: 2020-05-31 PoisoningMaximum Coverage ProblemThreat modeling 2020.02.19 2025.05.28 Literature Database
Deflecting Adversarial Attacks Authors: Yao Qin, Nicholas Frosst, Colin Raffel, Garrison Cottrell, Geoffrey Hinton | Published: 2020-02-18 PoisoningAdversarial Attack DetectionDefense Method 2020.02.18 2025.05.28 Literature Database
Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets Authors: Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey, Xingjun Ma | Published: 2020-02-14 PoisoningAdversarial Attack DetectionDefense Method 2020.02.14 2025.05.28 Literature Database
CEB Improves Model Robustness Authors: Ian Fischer, Alexander A. Alemi | Published: 2020-02-13 PoisoningModel Selection MethodRobustness Evaluation 2020.02.13 2025.05.28 Literature Database
Adversarial Robustness for Code Authors: Pavol Bielik, Martin Vechev | Published: 2020-02-11 | Updated: 2020-08-15 PoisoningRobustness Improvement MethodAdversarial Training 2020.02.11 2025.05.28 Literature Database
Adversarial Data Encryption Authors: Yingdong Hu, Liang Zhang, Wei Shan, Xiaoxiao Qin, Jing Qi, Zhenzhou Wu, Yang Yuan | Published: 2020-02-10 | Updated: 2020-02-11 PoisoningAdversarial attackCryptography 2020.02.10 2025.05.28 Literature Database
Certified Robustness to Label-Flipping Attacks via Randomized Smoothing Authors: Elan Rosenfeld, Ezra Winston, Pradeep Ravikumar, J. Zico Kolter | Published: 2020-02-07 | Updated: 2020-08-11 PoisoningRobustness Improvement MethodContinuous Linear Function 2020.02.07 2025.05.28 Literature Database
Assessing the Adversarial Robustness of Monte Carlo and Distillation Methods for Deep Bayesian Neural Network Classification Authors: Meet P. Vadera, Satya Narayan Shukla, Brian Jalaian, Benjamin M. Marlin | Published: 2020-02-07 Bayesian ClassificationPoisoningAdversarial Example 2020.02.07 2025.05.28 Literature Database
Can’t Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks Authors: Moshe Kravchik, Asaf Shabtai | Published: 2020-02-07 PoisoningRobustness Improvement MethodContent Specialized for Toxicity Attacks 2020.02.07 2025.05.28 Literature Database