Security of Distributed Machine Learning: A Game-Theoretic Approach to Design Secure DSVM Authors: Rui Zhang, Quanyan Zhu | Published: 2020-03-08 | Updated: 2020-04-26 Game TheoryPoisoningAdversarial Attack Methods 2020.03.08 2025.05.28 Literature Database
Dynamic Backdoor Attacks Against Machine Learning Models Authors: Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang | Published: 2020-03-07 | Updated: 2022-03-03 PoisoningContent Specialized for Toxicity AttacksDefense Method 2020.03.07 2025.05.28 Literature Database
Adversarial Attacks and Defenses on Graphs: A Review, A Tool and Empirical Studies Authors: Wei Jin, Yaxin Li, Han Xu, Yiqi Wang, Shuiwang Ji, Charu Aggarwal, Jiliang Tang | Published: 2020-03-02 | Updated: 2020-12-12 PoisoningAdversarial ExampleAdversarial Learning 2020.03.02 2025.05.28 Literature Database
Regularisation Can Mitigate Poisoning Attacks: A Novel Analysis Based on Multiobjective Bilevel Optimisation Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2020-02-28 | Updated: 2020-06-20 Hyperparameter OptimizationPoisoningRobustness Evaluation 2020.02.28 2025.05.28 Literature Database
Towards Backdoor Attacks and Defense in Robust Machine Learning Models Authors: Ezekiel Soremekun, Sakshi Udeshi, Sudipta Chattopadhyay | Published: 2020-02-25 | Updated: 2023-01-11 Backdoor AttackPoisoningRobustness Evaluation 2020.02.25 2025.05.28 Literature Database
Influence Function based Data Poisoning Attacks to Top-N Recommender Systems Authors: Minghong Fang, Neil Zhenqiang Gong, Jia Liu | Published: 2020-02-19 | Updated: 2020-05-31 PoisoningMaximum Coverage ProblemThreat modeling 2020.02.19 2025.05.28 Literature Database
Deflecting Adversarial Attacks Authors: Yao Qin, Nicholas Frosst, Colin Raffel, Garrison Cottrell, Geoffrey Hinton | Published: 2020-02-18 PoisoningAdversarial Attack DetectionDefense Method 2020.02.18 2025.05.28 Literature Database
Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets Authors: Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey, Xingjun Ma | Published: 2020-02-14 PoisoningAdversarial Attack DetectionDefense Method 2020.02.14 2025.05.28 Literature Database
CEB Improves Model Robustness Authors: Ian Fischer, Alexander A. Alemi | Published: 2020-02-13 PoisoningModel Selection MethodRobustness Evaluation 2020.02.13 2025.05.28 Literature Database
Adversarial Robustness for Code Authors: Pavol Bielik, Martin Vechev | Published: 2020-02-11 | Updated: 2020-08-15 PoisoningRobustness Improvement MethodAdversarial Training 2020.02.11 2025.05.28 Literature Database