Practical Attacks Against Graph-based Clustering Authors: Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou | Published: 2017-08-29 Community DetectionPoisoningAttack Method 2017.08.29 2025.05.28 Literature Database
Modular Learning Component Attacks: Today’s Reality, Tomorrow’s Challenge Authors: Xinyang Zhang, Yujie Ji, Ting Wang | Published: 2017-08-25 Model Extraction AttackLogic LockingAttack Method 2017.08.25 2025.05.28 Literature Database
Evasion Attacks against Machine Learning at Test Time Authors: Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio Roli | Published: 2017-08-21 Machine learningRobustness AnalysisAttack Method 2017.08.21 2025.05.28 Literature Database
Learning Universal Adversarial Perturbations with Generative Models Authors: Jamie Hayes, George Danezis | Published: 2017-08-17 | Updated: 2018-01-05 Certified RobustnessAttack MethodAdversarial Example 2017.08.17 2025.05.28 Literature Database
ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models Authors: Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, Cho-Jui Hsieh | Published: 2017-08-14 | Updated: 2017-11-02 PoisoningCertified RobustnessAttack Method 2017.08.14 2025.05.28 Literature Database
Cascade Adversarial Machine Learning Regularized with a Unified Embedding Authors: Taesik Na, Jong Hwan Ko, Saibal Mukhopadhyay | Published: 2017-08-08 | Updated: 2018-03-17 Robustness AnalysisAttack MethodAdversarial Learning 2017.08.08 2025.05.28 Literature Database
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be Authors: Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin | Published: 2017-03-28 IoT Security IssuesSecurity Analysis MethodAttack Method 2017.03.28 2025.05.28 Literature Database