Label-Only Membership Inference Attacks Authors: Christopher A. Choquette-Choo, Florian Tramer, Nicholas Carlini, Nicolas Papernot | Published: 2020-07-28 | Updated: 2021-12-05 Backdoor AttackMembership InferenceAttack Method 2020.07.28 2025.05.28 Literature Database
Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning Authors: Jirong Yi, Raghu Mudumbai, Weiyu Xu | Published: 2020-07-28 Attack MethodAdversarial ExampleAdversarial Perturbation Techniques 2020.07.28 2025.05.28 Literature Database
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review Authors: Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim | Published: 2020-07-21 | Updated: 2020-08-02 Backdoor AttackPoisoningAttack Method 2020.07.21 2025.05.28 Literature Database
Data Poisoning Attacks Against Federated Learning Systems Authors: Vale Tolpegin, Stacey Truex, Mehmet Emre Gursoy, Ling Liu | Published: 2020-07-16 | Updated: 2020-08-11 PoisoningPerformance EvaluationAttack Method 2020.07.16 2025.05.28 Literature Database
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2020-07-15 | Updated: 2020-10-23 Performance EvaluationAttack MethodGenerative Model Characteristics 2020.07.15 2025.05.28 Literature Database
Robustifying Reinforcement Learning Agents via Action Space Adversarial Training Authors: Kai Liang Tan, Yasaman Esfandiari, Xian Yeow Lee, Aakanksha, Soumik Sarkar | Published: 2020-07-14 Performance EvaluationAttack MethodDefense Mechanism 2020.07.14 2025.05.28 Literature Database
Security and Machine Learning in the Real World Authors: Ivan Evtimov, Weidong Cui, Ece Kamar, Emre Kiciman, Tadayoshi Kohno, Jerry Li | Published: 2020-07-13 Security AnalysisAttack MethodAdversarial Example 2020.07.13 2025.05.28 Literature Database
A simple defense against adversarial attacks on heatmap explanations Authors: Laura Rieger, Lars Kai Hansen | Published: 2020-07-13 PoisoningAttack MethodDefense Mechanism 2020.07.13 2025.05.28 Literature Database
Simple and Efficient Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes Authors: Satya Narayan Shukla, Anit Kumar Sahu, Devin Willmott, J. Zico Kolter | Published: 2020-07-13 | Updated: 2021-06-11 Attack MethodDimensionality Reduction MethodDeep Learning 2020.07.13 2025.05.28 Literature Database
ManiGen: A Manifold Aided Black-box Generator of Adversarial Examples Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah, Abdulelah Algosaibi, Adel Aldalbahi, Mohammed Alaneem, Abdulaziz Alhumam, Mohammed Anan | Published: 2020-07-11 Attack MethodAdversarial ExampleDefense Mechanism 2020.07.11 2025.05.28 Literature Database