Attack Method

Generating Adversarial Inputs Using A Black-box Differential Technique

Authors: João Batista Pereira Matos Juúnior, Lucas Carvalho Cordeiro, Marcelo d'Amorim, Xiaowei Huang | Published: 2020-07-10
Performance Evaluation
Attack Method
Adversarial Example

Attack of the Tails: Yes, You Really Can Backdoor Federated Learning

Authors: Hongyi Wang, Kartik Sreenivasan, Shashank Rajput, Harit Vishwakarma, Saurabh Agarwal, Jy-yong Sohn, Kangwook Lee, Dimitris Papailiopoulos | Published: 2020-07-09
Poisoning
Model Robustness
Attack Method

Just How Toxic is Data Poisoning? A Unified Benchmark for Backdoor and Data Poisoning Attacks

Authors: Avi Schwarzschild, Micah Goldblum, Arjun Gupta, John P Dickerson, Tom Goldstein | Published: 2020-06-22 | Updated: 2021-06-17
Poisoning
Poisoning Attack
Attack Method

Graph Backdoor

Authors: Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang | Published: 2020-06-21 | Updated: 2021-08-10
Graph Neural Network
Attack Method
Watermarking Technology

Systematic Attack Surface Reduction For Deployed Sentiment Analysis Models

Authors: Josh Kalin, David Noever, Gerry Dozier | Published: 2020-06-19
Attack Method
Adversarial Learning
Defense Mechanism

Adversarial Attacks for Multi-view Deep Models

Authors: Xuli Sun, Shiliang Sun | Published: 2020-06-19
Attack Method
Adversarial Example
Adversarial attack

Classifier-independent Lower-Bounds for Adversarial Robustness

Authors: Elvis Dohmatob | Published: 2020-06-17 | Updated: 2020-11-10
Bayesian Classification
Attack Method
Adversarial Learning

AdvMind: Inferring Adversary Intent of Black-Box Attacks

Authors: Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2020-06-16
Performance Evaluation
Attack Method
Adversarial Learning

On Adversarial Bias and the Robustness of Fair Machine Learning

Authors: Hongyan Chang, Ta Duy Nguyen, Sasi Kumar Murakonda, Ehsan Kazemi, Reza Shokri | Published: 2020-06-15
Poisoning
Membership Inference
Attack Method

Ensemble-based Feature Selection and Classification Model for DNS Typo-squatting Detection

Authors: Abdallah Moubayed, Emad Aqeeli, Abdallah Shami | Published: 2020-06-08
Attack Method
Feature Engineering
Vulnerability detection