Poisoning

Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses

Authors: Xiao Wang, Siyue Wang, Pin-Yu Chen, Yanzhi Wang, Brian Kulis, Xue Lin, Peter Chin | Published: 2019-08-20
Poisoning
Robustness Improvement Method
Adversarial Attack Methods

On Defending Against Label Flipping Attacks on Malware Detection Systems

Authors: Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti | Published: 2019-08-13 | Updated: 2020-06-16
Poisoning
Adversarial Attack Methods
Computational Complexity

On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method

Authors: Pu Zhao, Sijia Liu, Pin-Yu Chen, Nghia Hoang, Kaidi Xu, Bhavya Kailkhura, Xue Lin | Published: 2019-07-26 | Updated: 2019-12-04
Poisoning
Effective Perturbation Methods
Adversarial Transferability

Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics

Authors: Yuxin Ma, Tiankai Xie, Jundong Li, Ross Maciejewski | Published: 2019-07-17 | Updated: 2019-10-03
Backdoor Attack
Poisoning
Adversarial Attack Methods

Adversarial Security Attacks and Perturbations on Machine Learning and Deep Learning Methods

Authors: Arif Siddiqi | Published: 2019-07-17
Poisoning
Adversarial Example
Adversarial Attack Methods

Helen: Maliciously Secure Coopetitive Learning for Linear Models

Authors: Wenting Zheng, Raluca Ada Popa, Joseph E. Gonzalez, Ion Stoica | Published: 2019-07-16 | Updated: 2019-09-03
MPC Algorithm
Poisoning
Encryption Technology

Stateful Detection of Black-Box Adversarial Attacks

Authors: Steven Chen, Nicholas Carlini, David Wagner | Published: 2019-07-12
Poisoning
Attack Detection
Adversarial attack

Minimally distorted Adversarial Examples with a Fast Adaptive Boundary Attack

Authors: Francesco Croce, Matthias Hein | Published: 2019-07-03 | Updated: 2020-07-20
Poisoning
Vulnerability of Adversarial Examples
Adversarial attack

Comment on “Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network”

Authors: Roland S. Zimmermann | Published: 2019-07-01
Poisoning
Adversarial attack
Deep Learning Method

Improving Black-box Adversarial Attacks with a Transfer-based Prior

Authors: Shuyu Cheng, Yinpeng Dong, Tianyu Pang, Hang Su, Jun Zhu | Published: 2019-06-17 | Updated: 2020-07-26
Poisoning
Adversarial Perturbation Techniques
Optimization Problem