Adversarial Attack Methods

Quantifying Membership Inference Vulnerability via Generalization Gap and Other Model Metrics

Authors: Jason W. Bentley, Daniel Gibney, Gary Hoppenworth, Sumit Kumar Jha | Published: 2020-09-11
Membership Inference
Membership Disclosure Risk
Adversarial Attack Methods

Second Order Optimization for Adversarial Robustness and Interpretability

Authors: Theodoros Tsiligkaridis, Jay Roberts | Published: 2020-09-10
Performance Evaluation
Adversarial Attack Methods
Deep Learning Technology

Quantifying the Preferential Direction of the Model Gradient in Adversarial Training With Projected Gradient Descent

Authors: Ricardo Bigolin Lanfredi, Joyce D. Schroeder, Tolga Tasdizen | Published: 2020-09-10 | Updated: 2023-04-20
Poisoning
Performance Evaluation
Adversarial Attack Methods

Adversarial Attack on Large Scale Graph

Authors: Jintang Li, Tao Xie, Liang Chen, Fenfang Xie, Xiangnan He, Zibin Zheng | Published: 2020-09-08 | Updated: 2021-05-06
Graph Transformation
Adversarial Attack Methods
Structural Attack

Black Box to White Box: Discover Model Characteristics Based on Strategic Probing

Authors: Josh Kalin, Matthew Ciolino, David Noever, Gerry Dozier | Published: 2020-09-07
Adversarial Attack Methods
Machine Learning Method
Image Processing

Dynamically Computing Adversarial Perturbations for Recurrent Neural Networks

Authors: Shankar A. Deka, Dušan M. Stipanović, Claire J. Tomlin | Published: 2020-09-07
Multi-Class Classification
Adversarial Example
Adversarial Attack Methods

Detection Defense Against Adversarial Attacks with Saliency Map

Authors: Dengpan Ye, Chuanxi Chen, Changrui Liu, Hao Wang, Shunzhi Jiang | Published: 2020-09-06
Poisoning
Adversarial Example
Adversarial Attack Methods

Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack

Authors: Hadi Mansourifar, Weidong Shi | Published: 2020-08-23
Model Inversion
Adversarial Attack Methods
Face Recognition

Revisiting Adversarially Learned Injection Attacks Against Recommender Systems

Authors: Jiaxi Tang, Hongyi Wen, Ke Wang | Published: 2020-08-11 | Updated: 2020-08-28
Adversarial Attack Methods
Optimization Problem
Computational Efficiency

Investigating maximum likelihood based training of infinite mixtures for uncertainty quantification

Authors: Sina Däubener, Asja Fischer | Published: 2020-08-07 | Updated: 2020-08-17
Uncertainty Assessment
Adversarial Attack Methods
Deep Learning Method