Attack Type

mFI-PSO: A Flexible and Effective Method in Adversarial Image Generation for Deep Neural Networks

Authors: Hai Shu, Ronghua Shi, Qiran Jia, Hongtu Zhu, Ziqi Chen | Published: 2020-06-05 | Updated: 2022-05-08
Algorithm
Attack Type
Adversarial Attack Detection

Detecting Audio Attacks on ASR Systems with Dropout Uncertainty

Authors: Tejas Jayashankar, Jonathan Le Roux, Pierre Moulin | Published: 2020-06-02 | Updated: 2020-09-15
Attack Type
Adversarial Attack Detection
Malfunction of Voice Assistants

Perturbation Analysis of Gradient-based Adversarial Attacks

Authors: Utku Ozbulak, Manvel Gasparyan, Wesley De Neve, Arnout Van Messem | Published: 2020-06-02
Poisoning
Attack Type
Adversarial Attack Detection

Exploring the role of Input and Output Layers of a Deep Neural Network in Adversarial Defense

Authors: Jay N. Paranjape, Rahul Kumar Dubey, Vijendran V Gopalan | Published: 2020-06-02
Poisoning
Attack Type
Defense Effectiveness Analysis

A Framework for Evaluating Gradient Leakage Attacks in Federated Learning

Authors: Wenqi Wei, Ling Liu, Margaret Loper, Ka-Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2020-04-22 | Updated: 2020-04-23
Privacy Enhancing Technology
Poisoning
Attack Type

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers

Authors: Yusi Lei, Sen Chen, Lingling Fan, Fu Song, Yang Liu | Published: 2020-04-15
Prompt Injection
Attack Type
Defense Method

Policy Teaching via Environment Poisoning: Training-time Adversarial Attacks against Reinforcement Learning

Authors: Amin Rakhsha, Goran Radanovic, Rati Devidze, Xiaojin Zhu, Adish Singla | Published: 2020-03-28 | Updated: 2020-08-19
Toxicity of Rewards
Reinforcement Learning
Attack Type

Survey of Attacks and Defenses on Edge-Deployed Neural Networks

Authors: Mihailo Isakov, Vijay Gadepally, Karen M. Gettings, Michel A. Kinsy | Published: 2019-11-27
Privacy-Preserving Data Mining
Attack Type
Vulnerability Analysis

Local Model Poisoning Attacks to Byzantine-Robust Federated Learning

Authors: Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2019-11-26 | Updated: 2021-11-21
Poisoning
Model Performance Evaluation
Attack Type

Assessing Supply Chain Cyber Risks

Authors: Alberto Redondo, Alberto Torres-Barrán, David Ríos Insua, Jordi Domingo | Published: 2019-11-26
Risk Management
Information Security
Attack Type