Adversarial Attack Methods

Practical Adversarial Attacks on Spatiotemporal Traffic Forecasting Models

Authors: Fan Liu, Hao Liu, Wenzhao Jiang | Published: 2022-10-05
Adversarial Attack Methods
Time-Related Features
Deep Learning Method

Group Property Inference Attacks Against Graph Neural Networks

Authors: Xiuling Wang, Wendy Hui Wang | Published: 2022-09-02
Membership Inference
Model Performance Evaluation
Adversarial Attack Methods

Tweaking Metasploit to Evade Encrypted C2 Traffic Detection

Authors: Gonçalo Xavier, Carlos Novo, Ricardo Morla | Published: 2022-09-02
Model Performance Evaluation
Adversarial Attack Methods
Communication Analysis

Exploiting Fairness to Enhance Sensitive Attributes Reconstruction

Authors: Julien Ferry, Ulrich Aïvodji, Sébastien Gambs, Marie-José Huguet, Mohamed Siala | Published: 2022-09-02
Privacy Enhancing Technology
Experimental Validation
Adversarial Attack Methods

Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising

Authors: Sandhya Aneja, Nagender Aneja, Pg Emeroylariffion Abas, Abdul Ghani Naim | Published: 2022-06-25
Algorithm Design
Improvement of Learning
Adversarial Attack Methods

I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences

Authors: Daryna Oliynyk, Rudolf Mayer, Andreas Rauber | Published: 2022-06-16 | Updated: 2023-06-06
Poisoning
Membership Inference
Adversarial Attack Methods

Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection

Authors: Abderrahmen Amich, Ata Kaboudi, Birhanu Eshete | Published: 2022-06-15
Robustness
Adversarial Example
Adversarial Attack Methods

Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations

Authors: Mohammad Mahmudul Alam, Edward Raff, Tim Oates, James Holt | Published: 2022-06-13
Training Protocol
Adversarial Attack Methods
Deep Learning Method

Darknet Traffic Classification and Adversarial Attacks

Authors: Nhien Rust-Nguyen, Mark Stamp | Published: 2022-06-12
Performance Evaluation
Adversarial Attack Methods
Deep Learning Method

Membership Inference via Backdooring

Authors: Hongsheng Hu, Zoran Salcic, Gillian Dobbie, Jinjun Chen, Lichao Sun, Xuyun Zhang | Published: 2022-06-10
Attack Methods against DFL
Membership Inference
Adversarial Attack Methods