Poisoning

Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics

Authors: Yi Xiang Marcus Tan, Alfonso Iacovazzi, Ivan Homoliak, Yuval Elovici, Alexander Binder | Published: 2019-05-28 | Updated: 2019-11-27
Poisoning
Model Evaluation
Adversarial Learning

Improving the Robustness of Deep Neural Networks via Adversarial Training with Triplet Loss

Authors: Pengcheng Li, Jinfeng Yi, Bowen Zhou, Lijun Zhang | Published: 2019-05-28
Poisoning
Adversarial Example
Adversarial Learning

GAT: Generative Adversarial Training for Adversarial Example Detection and Robust Classification

Authors: Xuwang Yin, Soheil Kolouri, Gustavo K. Rohde | Published: 2019-05-27 | Updated: 2022-10-01
Binary Classifier
Poisoning
Adversarial Example Detection

Non-Determinism in Neural Networks for Adversarial Robustness

Authors: Daanish Ali Khan, Linhong Li, Ninghao Sha, Zhuoran Liu, Abelino Jimenez, Bhiksha Raj, Rita Singh | Published: 2019-05-26
Poisoning
Adversarial Example
Adversarial Example Detection

A Direct Approach to Robust Deep Learning Using Adversarial Networks

Authors: Huaxia Wang, Chun-Nam Yu | Published: 2019-05-23
Poisoning
Adversarial Example
Generative Adversarial Network

Deep Reinforcement Learning for Detecting Malicious Websites

Authors: Moitrayee Chatterjee, Akbar Siami Namin | Published: 2019-05-22
Phishing
Poisoning
Reinforcement Learning Algorithm

Learning to Confuse: Generating Training Time Adversarial Data with Auto-Encoder

Authors: Ji Feng, Qi-Zhi Cai, Zhi-Hua Zhou | Published: 2019-05-22
Poisoning
Effective Perturbation Methods
Machine Learning Algorithm

POPQORN: Quantifying Robustness of Recurrent Neural Networks

Authors: Ching-Yun Ko, Zhaoyang Lyu, Tsui-Wei Weng, Luca Daniel, Ngai Wong, Dahua Lin | Published: 2019-05-17
Poisoning
Model Evaluation
Performance Evaluation Method

Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization

Authors: Seungyong Moon, Gaon An, Hyun Oh Song | Published: 2019-05-16 | Updated: 2022-10-18
Query Generation Method
Poisoning
Optimization Methods

Data Poisoning Attacks on Stochastic Bandits

Authors: Fang Liu, Ness Shroff | Published: 2019-05-16
Algorithm
Poisoning
Attack Chain Analysis