Defense Effectiveness Analysis

FLAME: Taming Backdoors in Federated Learning (Extended Version 1)

Authors: Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider | Published: 2021-01-06 | Updated: 2023-08-05
Backdoor Attack Techniques
Poisoning
Defense Effectiveness Analysis

On the Effectiveness of Regularization Against Membership Inference Attacks

Authors: Yigitcan Kaya, Sanghyun Hong, Tudor Dumitras | Published: 2020-06-09
Privacy Assessment
Improvement of Learning
Defense Effectiveness Analysis

Tricking Adversarial Attacks To Fail

Authors: Blerta Lindqvist | Published: 2020-06-08
Attack Type
Adversarial Attack Detection
Defense Effectiveness Analysis

Exploring the role of Input and Output Layers of a Deep Neural Network in Adversarial Defense

Authors: Jay N. Paranjape, Rahul Kumar Dubey, Vijendran V Gopalan | Published: 2020-06-02
Poisoning
Attack Type
Defense Effectiveness Analysis

Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods

Authors: Kyungmi Lee, Anantha P. Chandrakasan | Published: 2020-06-01
Poisoning
Adversarial Attack Detection
Defense Effectiveness Analysis

Enhancing Resilience of Deep Learning Networks by Means of Transferable Adversaries

Authors: Moritz Seiler, Heike Trautmann, Pascal Kerschke | Published: 2020-05-27
Training Data Generation
Adversarial Example
Defense Effectiveness Analysis

Encryption Inspired Adversarial Defense for Visual Classification

Authors: MaungMaung AprilPyone, Hitoshi Kiya | Published: 2020-05-16
Machine Learning Algorithm
Machine Learning Method
Defense Effectiveness Analysis

DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses

Authors: Yaxin Li, Wei Jin, Han Xu, Jiliang Tang | Published: 2020-05-13
Algorithm
Explainability of Graph Machine Learning
Defense Effectiveness Analysis

Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability

Authors: Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna | Published: 2020-05-01 | Updated: 2021-03-14
Backdoor Attack
Poisoning
Defense Effectiveness Analysis

Minority Reports Defense: Defending Against Adversarial Patches

Authors: Michael McCoyd, Won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang, Jason Xinyu Liu, David Wagner | Published: 2020-04-28
Attack Detection
Adversarial Attack Detection
Defense Effectiveness Analysis