Vulnerability Attack Method

Diversity can be Transferred: Output Diversification for White- and Black-box Attacks

Authors: Yusuke Tashiro, Yang Song, Stefano Ermon | Published: 2020-03-15 | Updated: 2020-10-30
Poisoning
Adversarial Attack Methods
Vulnerability Attack Method

Certified Defenses for Adversarial Patches

Authors: Ping-Yeh Chiang, Renkun Ni, Ahmed Abdelkader, Chen Zhu, Christoph Studer, Tom Goldstein | Published: 2020-03-14 | Updated: 2020-09-25
Robustness
Vulnerability Attack Method
Defense Method

Undersensitivity in Neural Reading Comprehension

Authors: Johannes Welbl, Pasquale Minervini, Max Bartolo, Pontus Stenetorp, Sebastian Riedel | Published: 2020-02-15
Training Method
Vulnerability Attack Method
Defense Method

ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors

Authors: Ivan Homoliak, Petr Hanacek | Published: 2019-10-23
Modification of Network Traffic
Taxonomy of Attacks
Vulnerability Attack Method