Evolution of Neural Tangent Kernels under Benign and Adversarial Training Authors: Noel Loo, Ramin Hasani, Alexander Amini, Daniela Rus | Published: 2022-10-21 Adversarial ExampleAdversarial Attack MethodsDeep Learning Method 2022.10.21 2025.05.28 Literature Database
New data poison attacks on machine learning classifiers for mobile exfiltration Authors: Miguel A. Ramirez, Sangyoung Yoon, Ernesto Damiani, Hussam Al Hamadi, Claudio Agostino Ardagna, Nicola Bena, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun | Published: 2022-10-20 Backdoor AttackPoisoningAdversarial Attack Methods 2022.10.20 2025.05.28 Literature Database
Canary in a Coalmine: Better Membership Inference with Ensembled Adversarial Queries Authors: Yuxin Wen, Arpit Bansal, Hamid Kazemi, Eitan Borgnia, Micah Goldblum, Jonas Geiping, Tom Goldstein | Published: 2022-10-19 | Updated: 2023-06-01 Privacy AssessmentMembership Disclosure RiskAdversarial Attack Methods 2022.10.19 2025.05.28 Literature Database
An Empirical Analysis of SMS Scam Detection Systems Authors: Muhammad Salman, Muhammad Ikram, Mohamed Ali Kaafar | Published: 2022-10-19 Membership InferencePerformance EvaluationAdversarial Attack Methods 2022.10.19 2025.05.28 Literature Database
Scaling Adversarial Training to Large Perturbation Bounds Authors: Sravanti Addepalli, Samyak Jain, Gaurang Sriramanan, R. Venkatesh Babu | Published: 2022-10-18 Adversarial ExampleAdversarial Attack MethodsDeep Learning Method 2022.10.18 2025.05.28 Literature Database
Towards Generating Adversarial Examples on Mixed-type Data Authors: Han Xu, Menghai Pan, Zhimeng Jiang, Huiyuan Chen, Xiaoting Li, Mahashweta Das, Hao Yang | Published: 2022-10-17 Adversarial ExampleAdversarial Attack MethodsSelection and Evaluation of Optimization Algorithms 2022.10.17 2025.05.28 Literature Database
Practical Adversarial Attacks on Spatiotemporal Traffic Forecasting Models Authors: Fan Liu, Hao Liu, Wenzhao Jiang | Published: 2022-10-05 Adversarial Attack MethodsTime-Related FeaturesDeep Learning Method 2022.10.05 2025.05.28 Literature Database
Group Property Inference Attacks Against Graph Neural Networks Authors: Xiuling Wang, Wendy Hui Wang | Published: 2022-09-02 Membership InferenceModel Performance EvaluationAdversarial Attack Methods 2022.09.02 2025.05.28 Literature Database
Tweaking Metasploit to Evade Encrypted C2 Traffic Detection Authors: Gonçalo Xavier, Carlos Novo, Ricardo Morla | Published: 2022-09-02 Model Performance EvaluationAdversarial Attack MethodsCommunication Analysis 2022.09.02 2025.05.28 Literature Database
Exploiting Fairness to Enhance Sensitive Attributes Reconstruction Authors: Julien Ferry, Ulrich Aïvodji, Sébastien Gambs, Marie-José Huguet, Mohamed Siala | Published: 2022-09-02 Privacy Enhancing TechnologyExperimental ValidationAdversarial Attack Methods 2022.09.02 2025.05.28 Literature Database