Attack Method

Optimal Transport as a Defense Against Adversarial Attacks

Authors: Quentin Bouniot, Romaric Audigier, Angélique Loesch | Published: 2021-02-05 | Updated: 2021-03-30
Model Performance Evaluation
Attack Method
Adversarial Training

Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks

Authors: Jinyuan Jia, Yupei Liu, Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2020-12-07 | Updated: 2021-12-02
Backdoor Attack
Attack Method
Machine Learning

Black-box Model Inversion Attribute Inference Attacks on Classification Models

Authors: Shagufta Mehnaz, Ninghui Li, Elisa Bertino | Published: 2020-12-07
Membership Inference
Attack Method
Privacy Protection in Machine Learning

Unleashing the Tiger: Inference Attacks on Split Learning

Authors: Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi | Published: 2020-12-04 | Updated: 2021-11-04
Membership Inference
Attack Method
Privacy Protection in Machine Learning

Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers

Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-12-03 | Updated: 2021-03-09
Attack Method
Adversarial Example
Adversarial Learning

Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization

Authors: Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan | Published: 2020-10-24 | Updated: 2021-11-30
Taxonomy of Attacks
Attack Method
Knowledge Graph

Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders

Authors: Elior Nehemya, Yael Mathov, Asaf Shabtai, Yuval Elovici | Published: 2020-10-19 | Updated: 2021-09-02
Attack Method
Machine Learning
Financial Intelligence

GOAT: GPU Outsourcing of Deep Learning Training With Asynchronous Probabilistic Integrity Verification Inside Trusted Execution Environment

Authors: Aref Asvadishirehjini, Murat Kantarcioglu, Bradley Malin | Published: 2020-10-17
TEE Implementation
Poisoning
Attack Method

An Analysis of Robustness of Non-Lipschitz Networks

Authors: Maria-Florina Balcan, Avrim Blum, Dravyansh Sharma, Hongyang Zhang | Published: 2020-10-13 | Updated: 2023-04-18
Loss Function
Attack Method
Adversarial Training

Data Analytics-enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets

Authors: Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed | Published: 2020-10-04
Dataset Generation
Data Extraction and Analysis
Attack Method