A General Framework For Detecting Anomalous Inputs to DNN Classifiers Authors: Jayaram Raghuram, Varun Chandrasekaran, Somesh Jha, Suman Banerjee | Published: 2020-07-29 | Updated: 2021-06-17 Performance EvaluationAttack MethodDeep Learning 2020.07.29 2025.05.28 Literature Database
Adversarial Robustness for Machine Learning Cyber Defenses Using Log Data Authors: Kai Steverson, Jonathan Mullin, Metin Ahiskali | Published: 2020-07-29 Attack MethodGenerative Model CharacteristicsDefense Mechanism 2020.07.29 2025.05.28 Literature Database
Label-Only Membership Inference Attacks Authors: Christopher A. Choquette-Choo, Florian Tramer, Nicholas Carlini, Nicolas Papernot | Published: 2020-07-28 | Updated: 2021-12-05 Backdoor AttackMembership InferenceAttack Method 2020.07.28 2025.05.28 Literature Database
Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning Authors: Jirong Yi, Raghu Mudumbai, Weiyu Xu | Published: 2020-07-28 Attack MethodAdversarial ExampleAdversarial Perturbation Techniques 2020.07.28 2025.05.28 Literature Database
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review Authors: Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim | Published: 2020-07-21 | Updated: 2020-08-02 Backdoor AttackPoisoningAttack Method 2020.07.21 2025.05.28 Literature Database
Data Poisoning Attacks Against Federated Learning Systems Authors: Vale Tolpegin, Stacey Truex, Mehmet Emre Gursoy, Ling Liu | Published: 2020-07-16 | Updated: 2020-08-11 PoisoningPerformance EvaluationAttack Method 2020.07.16 2025.05.28 Literature Database
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2020-07-15 | Updated: 2020-10-23 Performance EvaluationAttack MethodGenerative Model Characteristics 2020.07.15 2025.05.28 Literature Database
Robustifying Reinforcement Learning Agents via Action Space Adversarial Training Authors: Kai Liang Tan, Yasaman Esfandiari, Xian Yeow Lee, Aakanksha, Soumik Sarkar | Published: 2020-07-14 Performance EvaluationAttack MethodDefense Mechanism 2020.07.14 2025.05.28 Literature Database
Security and Machine Learning in the Real World Authors: Ivan Evtimov, Weidong Cui, Ece Kamar, Emre Kiciman, Tadayoshi Kohno, Jerry Li | Published: 2020-07-13 Security AnalysisAttack MethodAdversarial Example 2020.07.13 2025.05.28 Literature Database
A simple defense against adversarial attacks on heatmap explanations Authors: Laura Rieger, Lars Kai Hansen | Published: 2020-07-13 PoisoningAttack MethodDefense Mechanism 2020.07.13 2025.05.28 Literature Database