Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture Authors: Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal | Published: 2021-10-15 Membership InferenceAdversarial ExampleDefense Mechanism 2021.10.15 2025.05.28 Literature Database
Adversarial Attacks on ML Defense Models Competition Authors: Yinpeng Dong, Qi-An Fu, Xiao Yang, Wenzhao Xiang, Tianyu Pang, Hang Su, Jun Zhu, Jiayu Tang, Yuefeng Chen, XiaoFeng Mao, Yuan He, Hui Xue, Chao Li, Ye Liu, Qilong Zhang, Lianli Gao, Yunrui Yu, Xitong Gao, Zhe Zhao, Daquan Lin, Jiadong Lin, Chuanbiao Song, Zihao Wang, Zhennan Wu, Yang Guo, Jiequan Cui, Xiaogang Xu, Pengguang Chen | Published: 2021-10-15 Robustness EvaluationAdversarial ExampleAdversarial Attack Methods 2021.10.15 2025.05.28 Literature Database
Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks Authors: Hanxun Huang, Yisen Wang, Sarah Monazam Erfani, Quanquan Gu, James Bailey, Xingjun Ma | Published: 2021-10-07 | Updated: 2022-01-23 Robustness EvaluationAdversarial ExampleAdversarial Attack Methods 2021.10.07 2025.05.28 Literature Database
Attacks on Visualization-Based Malware Detection: Balancing Effectiveness and Executability Authors: Hadjer Benkraouda, Jingyu Qian, Hung Quoc Tran, Berkay Kaplan | Published: 2021-09-21 Malware Detection MethodAdversarial ExampleAdversarial attack 2021.09.21 2025.05.28 Literature Database
Excess Capacity and Backdoor Poisoning Authors: Naren Sarayu Manoj, Avrim Blum | Published: 2021-09-02 | Updated: 2021-11-03 Data Contamination DetectionBackdoor AttackAdversarial Example 2021.09.02 2025.05.28 Literature Database
EG-Booster: Explanation-Guided Booster of ML Evasion Attacks Authors: Abderrahmen Amich, Birhanu Eshete | Published: 2021-08-31 | Updated: 2021-09-02 AlgorithmAdversarial ExampleMachine Learning Method 2021.08.31 2025.05.28 Literature Database
Semantic-Preserving Adversarial Text Attacks Authors: Xinghao Yang, Weifeng Liu, James Bailey, Dacheng Tao, Wei Liu | Published: 2021-08-23 | Updated: 2023-03-03 AlgorithmText Generation MethodAdversarial Example 2021.08.23 2025.05.28 Literature Database
“Adversarial Examples” for Proof-of-Learning Authors: Rui Zhang, Jian Liu, Yuan Ding, Zhibo Wu, Qingbiao Wang, Kui Ren | Published: 2021-08-21 | Updated: 2022-04-05 AlgorithmTraining ProtocolAdversarial Example 2021.08.21 2025.05.28 Literature Database
Advances in adversarial attacks and defenses in computer vision: A survey Authors: Naveed Akhtar, Ajmal Mian, Navid Kardan, Mubarak Shah | Published: 2021-08-01 | Updated: 2021-09-02 Backdoor AttackRobustnessAdversarial Example 2021.08.01 2025.05.28 Literature Database
Unsupervised Detection of Adversarial Examples with Model Explanations Authors: Gihyuk Ko, Gyumin Lim | Published: 2021-07-22 Membership InferenceAttack TypeAdversarial Example 2021.07.22 2025.05.28 Literature Database