Generating Adversarial Inputs Using A Black-box Differential Technique Authors: João Batista Pereira Matos Juúnior, Lucas Carvalho Cordeiro, Marcelo d'Amorim, Xiaowei Huang | Published: 2020-07-10 Performance EvaluationAttack MethodAdversarial Example 2020.07.10 2025.05.28 Literature Database
Attack of the Tails: Yes, You Really Can Backdoor Federated Learning Authors: Hongyi Wang, Kartik Sreenivasan, Shashank Rajput, Harit Vishwakarma, Saurabh Agarwal, Jy-yong Sohn, Kangwook Lee, Dimitris Papailiopoulos | Published: 2020-07-09 PoisoningModel RobustnessAttack Method 2020.07.09 2025.05.28 Literature Database
Just How Toxic is Data Poisoning? A Unified Benchmark for Backdoor and Data Poisoning Attacks Authors: Avi Schwarzschild, Micah Goldblum, Arjun Gupta, John P Dickerson, Tom Goldstein | Published: 2020-06-22 | Updated: 2021-06-17 PoisoningPoisoning AttackAttack Method 2020.06.22 2025.05.28 Literature Database
Graph Backdoor Authors: Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang | Published: 2020-06-21 | Updated: 2021-08-10 Graph Neural NetworkAttack MethodWatermarking Technology 2020.06.21 2025.05.28 Literature Database
Systematic Attack Surface Reduction For Deployed Sentiment Analysis Models Authors: Josh Kalin, David Noever, Gerry Dozier | Published: 2020-06-19 Attack MethodAdversarial LearningDefense Mechanism 2020.06.19 2025.05.28 Literature Database
Adversarial Attacks for Multi-view Deep Models Authors: Xuli Sun, Shiliang Sun | Published: 2020-06-19 Attack MethodAdversarial ExampleAdversarial attack 2020.06.19 2025.05.28 Literature Database
Classifier-independent Lower-Bounds for Adversarial Robustness Authors: Elvis Dohmatob | Published: 2020-06-17 | Updated: 2020-11-10 Bayesian ClassificationAttack MethodAdversarial Learning 2020.06.17 2025.05.28 Literature Database
AdvMind: Inferring Adversary Intent of Black-Box Attacks Authors: Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2020-06-16 Performance EvaluationAttack MethodAdversarial Learning 2020.06.16 2025.05.28 Literature Database
On Adversarial Bias and the Robustness of Fair Machine Learning Authors: Hongyan Chang, Ta Duy Nguyen, Sasi Kumar Murakonda, Ehsan Kazemi, Reza Shokri | Published: 2020-06-15 PoisoningMembership InferenceAttack Method 2020.06.15 2025.05.28 Literature Database
Ensemble-based Feature Selection and Classification Model for DNS Typo-squatting Detection Authors: Abdallah Moubayed, Emad Aqeeli, Abdallah Shami | Published: 2020-06-08 Attack MethodFeature EngineeringVulnerability detection 2020.06.08 2025.05.28 Literature Database