Attack Method

Poisoning Attacks with Generative Adversarial Nets

Authors: Luis Muñoz-González, Bjarne Pfitzner, Matteo Russo, Javier Carnerero-Cano, Emil C. Lupu | Published: 2019-06-18 | Updated: 2019-09-25
Backdoor Attack
Attack Method
Generative Adversarial Network

On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks

Authors: Masoumeh Shafieinejad, Jiaqi Wang, Nils Lukas, Xinda Li, Florian Kerschbaum | Published: 2019-06-18 | Updated: 2019-11-26
DNN IP Protection Method
Backdoor Attack
Attack Method

Membership Privacy for Machine Learning Models Through Knowledge Transfer

Authors: Virat Shejwalkar, Amir Houmansadr | Published: 2019-06-15 | Updated: 2020-12-31
Privacy Protection
Attack Method
Knowledge Transferability

Combatting Adversarial Attacks through Denoising and Dimensionality Reduction: A Cascaded Autoencoder Approach

Authors: Rajeev Sahay, Rehana Mahfuz, Aly El Gamal | Published: 2018-12-07
Attack Method
Adversarial Example Detection
Defense Effectiveness Analysis

Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks

Authors: Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg | Published: 2018-05-30
Backdoor Detection
Attack Method
Deep Learning

What we learn from learning – Understanding capabilities and limitations of machine learning in botnet attacks

Authors: David Santana, Shan Suthaharan, Somya Mohanty | Published: 2018-05-03
Cybersecurity
Botnet Traffic
Attack Method

MEADE: Towards a Malicious Email Attachment Detection Engine

Authors: Ethan M. Rudd, Richard Harang, Joshua Saxe | Published: 2018-04-22
Cybersecurity
Attack Method
Adversarial Example Detection

Neural Trojans

Authors: Yuntao Liu, Yang Xie, Ankur Srivastava | Published: 2017-10-03
Backdoor Detection
Attack Method
Deep Learning

On Security and Sparsity of Linear Classifiers for Adversarial Settings

Authors: Ambra Demontis, Paolo Russu, Battista Biggio, Giorgio Fumera, Fabio Roli | Published: 2017-08-31
Membership Inference
Robustness Analysis
Attack Method

Coppersmith’s lattices and “focus groups”: an attack on small-exponent RSA

Authors: Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan | Published: 2017-08-30 | Updated: 2020-12-16
Privacy Protection Method
Attack Method
Mathematical Analysis