Optimal Transport as a Defense Against Adversarial Attacks Authors: Quentin Bouniot, Romaric Audigier, Angélique Loesch | Published: 2021-02-05 | Updated: 2021-03-30 Model Performance EvaluationAttack MethodAdversarial Training 2021.02.05 2025.05.28 Literature Database
Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks Authors: Jinyuan Jia, Yupei Liu, Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2020-12-07 | Updated: 2021-12-02 Backdoor AttackAttack MethodMachine Learning 2020.12.07 2025.05.28 Literature Database
Black-box Model Inversion Attribute Inference Attacks on Classification Models Authors: Shagufta Mehnaz, Ninghui Li, Elisa Bertino | Published: 2020-12-07 Membership InferenceAttack MethodPrivacy Protection in Machine Learning 2020.12.07 2025.05.28 Literature Database
Unleashing the Tiger: Inference Attacks on Split Learning Authors: Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi | Published: 2020-12-04 | Updated: 2021-11-04 Membership InferenceAttack MethodPrivacy Protection in Machine Learning 2020.12.04 2025.05.28 Literature Database
Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-12-03 | Updated: 2021-03-09 Attack MethodAdversarial ExampleAdversarial Learning 2020.12.03 2025.05.28 Literature Database
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization Authors: Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan | Published: 2020-10-24 | Updated: 2021-11-30 Taxonomy of AttacksAttack MethodKnowledge Graph 2020.10.24 2025.05.28 Literature Database
Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders Authors: Elior Nehemya, Yael Mathov, Asaf Shabtai, Yuval Elovici | Published: 2020-10-19 | Updated: 2021-09-02 Attack MethodMachine LearningFinancial Intelligence 2020.10.19 2025.05.28 Literature Database
GOAT: GPU Outsourcing of Deep Learning Training With Asynchronous Probabilistic Integrity Verification Inside Trusted Execution Environment Authors: Aref Asvadishirehjini, Murat Kantarcioglu, Bradley Malin | Published: 2020-10-17 TEE ImplementationPoisoningAttack Method 2020.10.17 2025.05.28 Literature Database
An Analysis of Robustness of Non-Lipschitz Networks Authors: Maria-Florina Balcan, Avrim Blum, Dravyansh Sharma, Hongyang Zhang | Published: 2020-10-13 | Updated: 2023-04-18 Loss FunctionAttack MethodAdversarial Training 2020.10.13 2025.05.28 Literature Database
Data Analytics-enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets Authors: Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed | Published: 2020-10-04 Dataset GenerationData Extraction and AnalysisAttack Method 2020.10.04 2025.05.28 Literature Database