Adversarial Attack Methods

Evolution of Neural Tangent Kernels under Benign and Adversarial Training

Authors: Noel Loo, Ramin Hasani, Alexander Amini, Daniela Rus | Published: 2022-10-21
Adversarial Example
Adversarial Attack Methods
Deep Learning Method

New data poison attacks on machine learning classifiers for mobile exfiltration

Authors: Miguel A. Ramirez, Sangyoung Yoon, Ernesto Damiani, Hussam Al Hamadi, Claudio Agostino Ardagna, Nicola Bena, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun | Published: 2022-10-20
Backdoor Attack
Poisoning
Adversarial Attack Methods

Canary in a Coalmine: Better Membership Inference with Ensembled Adversarial Queries

Authors: Yuxin Wen, Arpit Bansal, Hamid Kazemi, Eitan Borgnia, Micah Goldblum, Jonas Geiping, Tom Goldstein | Published: 2022-10-19 | Updated: 2023-06-01
Privacy Assessment
Membership Disclosure Risk
Adversarial Attack Methods

An Empirical Analysis of SMS Scam Detection Systems

Authors: Muhammad Salman, Muhammad Ikram, Mohamed Ali Kaafar | Published: 2022-10-19
Membership Inference
Performance Evaluation
Adversarial Attack Methods

Scaling Adversarial Training to Large Perturbation Bounds

Authors: Sravanti Addepalli, Samyak Jain, Gaurang Sriramanan, R. Venkatesh Babu | Published: 2022-10-18
Adversarial Example
Adversarial Attack Methods
Deep Learning Method

Towards Generating Adversarial Examples on Mixed-type Data

Authors: Han Xu, Menghai Pan, Zhimeng Jiang, Huiyuan Chen, Xiaoting Li, Mahashweta Das, Hao Yang | Published: 2022-10-17
Adversarial Example
Adversarial Attack Methods
Selection and Evaluation of Optimization Algorithms

Practical Adversarial Attacks on Spatiotemporal Traffic Forecasting Models

Authors: Fan Liu, Hao Liu, Wenzhao Jiang | Published: 2022-10-05
Adversarial Attack Methods
Time-Related Features
Deep Learning Method

Group Property Inference Attacks Against Graph Neural Networks

Authors: Xiuling Wang, Wendy Hui Wang | Published: 2022-09-02
Membership Inference
Model Performance Evaluation
Adversarial Attack Methods

Tweaking Metasploit to Evade Encrypted C2 Traffic Detection

Authors: Gonçalo Xavier, Carlos Novo, Ricardo Morla | Published: 2022-09-02
Model Performance Evaluation
Adversarial Attack Methods
Communication Analysis

Exploiting Fairness to Enhance Sensitive Attributes Reconstruction

Authors: Julien Ferry, Ulrich Aïvodji, Sébastien Gambs, Marie-José Huguet, Mohamed Siala | Published: 2022-09-02
Privacy Enhancing Technology
Experimental Validation
Adversarial Attack Methods