Poisoning

CEB Improves Model Robustness

Authors: Ian Fischer, Alexander A. Alemi | Published: 2020-02-13
Poisoning
Model Selection Method
Robustness Evaluation

Adversarial Robustness for Code

Authors: Pavol Bielik, Martin Vechev | Published: 2020-02-11 | Updated: 2020-08-15
Poisoning
Robustness Improvement Method
Adversarial Training

Adversarial Data Encryption

Authors: Yingdong Hu, Liang Zhang, Wei Shan, Xiaoxiao Qin, Jing Qi, Zhenzhou Wu, Yang Yuan | Published: 2020-02-10 | Updated: 2020-02-11
Poisoning
Adversarial attack
Cryptography

Certified Robustness to Label-Flipping Attacks via Randomized Smoothing

Authors: Elan Rosenfeld, Ezra Winston, Pradeep Ravikumar, J. Zico Kolter | Published: 2020-02-07 | Updated: 2020-08-11
Poisoning
Robustness Improvement Method
Continuous Linear Function

Assessing the Adversarial Robustness of Monte Carlo and Distillation Methods for Deep Bayesian Neural Network Classification

Authors: Meet P. Vadera, Satya Narayan Shukla, Brian Jalaian, Benjamin M. Marlin | Published: 2020-02-07
Bayesian Classification
Poisoning
Adversarial Example

Can’t Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks

Authors: Moshe Kravchik, Asaf Shabtai | Published: 2020-02-07
Poisoning
Robustness Improvement Method
Content Specialized for Toxicity Attacks

Learning to Detect Malicious Clients for Robust Federated Learning

Authors: Suyi Li, Yong Cheng, Wei Wang, Yang Liu, Tianjian Chen | Published: 2020-02-01
Poisoning
Malicious Node Detection
Federated Learning System

Adversarial Attack on Community Detection by Hiding Individuals

Authors: Jia Li, Honglei Zhang, Zhichao Han, Yu Rong, Hong Cheng, Junzhou Huang | Published: 2020-01-22
Community Detection
Poisoning
Adversarial Attack Detection

Advbox: a toolbox to generate adversarial examples that fool neural networks

Authors: Dou Goodman, Hao Xin, Wang Yang, Wu Yuesheng, Xiong Junfeng, Zhang Huan | Published: 2020-01-13 | Updated: 2020-08-26
Poisoning
Adversarial Example
Adversarial Attack Methods

On the Resilience of Biometric Authentication Systems against Random Inputs

Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar | Published: 2020-01-13 | Updated: 2020-01-24
Poisoning
Adversarial attack
Machine Learning