mFI-PSO: A Flexible and Effective Method in Adversarial Image Generation for Deep Neural Networks Authors: Hai Shu, Ronghua Shi, Qiran Jia, Hongtu Zhu, Ziqi Chen | Published: 2020-06-05 | Updated: 2022-05-08 AlgorithmAttack TypeAdversarial Attack Detection 2020.06.05 2025.05.13 Literature Database
Detecting Audio Attacks on ASR Systems with Dropout Uncertainty Authors: Tejas Jayashankar, Jonathan Le Roux, Pierre Moulin | Published: 2020-06-02 | Updated: 2020-09-15 Attack TypeAdversarial Attack DetectionMalfunction of Voice Assistants 2020.06.02 2025.05.13 Literature Database
Perturbation Analysis of Gradient-based Adversarial Attacks Authors: Utku Ozbulak, Manvel Gasparyan, Wesley De Neve, Arnout Van Messem | Published: 2020-06-02 PoisoningAttack TypeAdversarial Attack Detection 2020.06.02 2025.05.13 Literature Database
Exploring the role of Input and Output Layers of a Deep Neural Network in Adversarial Defense Authors: Jay N. Paranjape, Rahul Kumar Dubey, Vijendran V Gopalan | Published: 2020-06-02 PoisoningAttack TypeDefense Effectiveness Analysis 2020.06.02 2025.05.13 Literature Database
A Framework for Evaluating Gradient Leakage Attacks in Federated Learning Authors: Wenqi Wei, Ling Liu, Margaret Loper, Ka-Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2020-04-22 | Updated: 2020-04-23 Privacy Enhancing TechnologyPoisoningAttack Type 2020.04.22 2025.05.13 Literature Database
Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers Authors: Yusi Lei, Sen Chen, Lingling Fan, Fu Song, Yang Liu | Published: 2020-04-15 Prompt InjectionAttack TypeDefense Method 2020.04.15 2025.05.13 Literature Database
Policy Teaching via Environment Poisoning: Training-time Adversarial Attacks against Reinforcement Learning Authors: Amin Rakhsha, Goran Radanovic, Rati Devidze, Xiaojin Zhu, Adish Singla | Published: 2020-03-28 | Updated: 2020-08-19 Toxicity of RewardsReinforcement LearningAttack Type 2020.03.28 2025.05.13 Literature Database
Survey of Attacks and Defenses on Edge-Deployed Neural Networks Authors: Mihailo Isakov, Vijay Gadepally, Karen M. Gettings, Michel A. Kinsy | Published: 2019-11-27 Privacy-Preserving Data MiningAttack TypeVulnerability Analysis 2019.11.27 2025.05.13 Literature Database
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning Authors: Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2019-11-26 | Updated: 2021-11-21 PoisoningModel Performance EvaluationAttack Type 2019.11.26 2025.05.13 Literature Database
Assessing Supply Chain Cyber Risks Authors: Alberto Redondo, Alberto Torres-Barrán, David Ríos Insua, Jordi Domingo | Published: 2019-11-26 Risk ManagementInformation SecurityAttack Type 2019.11.26 2025.05.13 Literature Database