Understanding and Improving Graph Injection Attack by Promoting Unnoticeability Authors: Yongqiang Chen, Han Yang, Yonggang Zhang, Kaili Ma, Tongliang Liu, Bo Han, James Cheng | Published: 2022-02-16 | Updated: 2022-04-05 PoisoningMalicious Node InjectionDefense Method 2022.02.16 2025.05.28 Literature Database
StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection Authors: Aqib Rashid, Jose Such | Published: 2022-02-15 | Updated: 2023-04-24 Prompt InjectionModel Selection MethodDefense Method 2022.02.15 2025.05.28 Literature Database
Holistic Adversarial Robustness of Deep Learning Models Authors: Pin-Yu Chen, Sijia Liu | Published: 2022-02-15 | Updated: 2023-01-05 PoisoningAdversarial Attack DetectionDefense Method 2022.02.15 2025.05.28 Literature Database
Membership Inference Attacks and Defenses in Neural Network Pruning Authors: Xiaoyong Yuan, Lan Zhang | Published: 2022-02-07 | Updated: 2022-08-03 Privacy Risk ManagementMembership Disclosure RiskDefense Method 2022.02.07 2025.05.28 Literature Database
Pixle: a fast and effective black-box attack based on rearranging pixels Authors: Jary Pomponi, Simone Scardapane, Aurelio Uncini | Published: 2022-02-04 Adversarial Attack DetectionVulnerability Attack MethodDefense Method 2022.02.04 2025.05.28 Literature Database
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders Authors: Tianshuo Cong, Xinlei He, Yang Zhang | Published: 2022-01-27 | Updated: 2022-08-31 WatermarkingMembership InferenceDefense Method 2022.01.27 2025.05.28 Literature Database
Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning Authors: Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang | Published: 2021-12-29 | Updated: 2022-10-07 Backdoor AttackPoisoningDefense Method 2021.12.29 2025.05.28 Literature Database
SoK: A Study of the Security on Voice Processing Systems Authors: Robert Chang, Logan Kuo, Arthur Liu, Nader Sehatbakhsh | Published: 2021-12-24 Privacy Risk ManagementAdversarial Attack MethodsDefense Method 2021.12.24 2025.05.28 Literature Database
Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza | Published: 2021-12-22 PoisoningAdversarial LearningDefense Method 2021.12.22 2025.05.28 Literature Database
A Theoretical View of Linear Backpropagation and Its Convergence Authors: Ziang Li, Yiwen Guo, Haodi Liu, Changshui Zhang | Published: 2021-12-21 | Updated: 2024-01-10 Model DesignConvergence AnalysisDefense Method 2021.12.21 2025.05.28 Literature Database