Adversarial Data Encryption Authors: Yingdong Hu, Liang Zhang, Wei Shan, Xiaoxiao Qin, Jing Qi, Zhenzhou Wu, Yang Yuan | Published: 2020-02-10 | Updated: 2020-02-11 PoisoningAdversarial attackCryptography 2020.02.10 2025.05.28 Literature Database
Certified Robustness to Label-Flipping Attacks via Randomized Smoothing Authors: Elan Rosenfeld, Ezra Winston, Pradeep Ravikumar, J. Zico Kolter | Published: 2020-02-07 | Updated: 2020-08-11 PoisoningRobustness Improvement MethodContinuous Linear Function 2020.02.07 2025.05.28 Literature Database
Assessing the Adversarial Robustness of Monte Carlo and Distillation Methods for Deep Bayesian Neural Network Classification Authors: Meet P. Vadera, Satya Narayan Shukla, Brian Jalaian, Benjamin M. Marlin | Published: 2020-02-07 Bayesian ClassificationPoisoningAdversarial Example 2020.02.07 2025.05.28 Literature Database
Can’t Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks Authors: Moshe Kravchik, Asaf Shabtai | Published: 2020-02-07 PoisoningRobustness Improvement MethodContent Specialized for Toxicity Attacks 2020.02.07 2025.05.28 Literature Database
Learning to Detect Malicious Clients for Robust Federated Learning Authors: Suyi Li, Yong Cheng, Wei Wang, Yang Liu, Tianjian Chen | Published: 2020-02-01 PoisoningMalicious Node DetectionFederated Learning System 2020.02.01 2025.05.28 Literature Database
Adversarial Attack on Community Detection by Hiding Individuals Authors: Jia Li, Honglei Zhang, Zhichao Han, Yu Rong, Hong Cheng, Junzhou Huang | Published: 2020-01-22 Community DetectionPoisoningAdversarial Attack Detection 2020.01.22 2025.05.28 Literature Database
Advbox: a toolbox to generate adversarial examples that fool neural networks Authors: Dou Goodman, Hao Xin, Wang Yang, Wu Yuesheng, Xiong Junfeng, Zhang Huan | Published: 2020-01-13 | Updated: 2020-08-26 PoisoningAdversarial ExampleAdversarial Attack Methods 2020.01.13 2025.05.28 Literature Database
On the Resilience of Biometric Authentication Systems against Random Inputs Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar | Published: 2020-01-13 | Updated: 2020-01-24 PoisoningAdversarial attackMachine Learning 2020.01.13 2025.05.28 Literature Database
Benchmarking Adversarial Robustness Authors: Yinpeng Dong, Qi-An Fu, Xiao Yang, Tianyu Pang, Hang Su, Zihao Xiao, Jun Zhu | Published: 2019-12-26 PoisoningAdversarial ExampleEffectiveness Analysis of Defense Methods 2019.12.26 2025.05.28 Literature Database
secml: A Python Library for Secure and Explainable Machine Learning Authors: Maura Pintor, Luca Demetrio, Angelo Sotgiu, Marco Melis, Ambra Demontis, Battista Biggio | Published: 2019-12-20 | Updated: 2022-05-13 PoisoningAdversarial LearningWatermark Evaluation 2019.12.20 2025.05.28 Literature Database