Accumulative Poisoning Attacks on Real-time Data

Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu | Published: 2021-06-18 | Updated: 2021-10-26

Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples

Authors: Maura Pintor, Luca Demetrio, Angelo Sotgiu, Ambra Demontis, Nicholas Carlini, Battista Biggio, Fabio Roli | Published: 2021-06-18 | Updated: 2022-10-11

Bad Characters: Imperceptible NLP Attacks

Authors: Nicholas Boucher, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2021-06-18 | Updated: 2021-12-11

Localized Uncertainty Attacks

Authors: Ousmane Amadou Dia, Theofanis Karaletsos, Caner Hazirbas, Cristian Canton Ferrer, Ilknur Kaynar Kabul, Erik Meijer | Published: 2021-06-17

Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch

Authors: Hossein Souri, Liam Fowl, Rama Chellappa, Micah Goldblum, Tom Goldstein | Published: 2021-06-16 | Updated: 2022-10-13

Optimal Accounting of Differential Privacy via Characteristic Function

Authors: Yuqing Zhu, Jinshuo Dong, Yu-Xiang Wang | Published: 2021-06-16 | Updated: 2022-05-31

Spoofing Generalization: When Can’t You Trust Proprietary Models?

Authors: Ankur Moitra, Elchanan Mossel, Colin Sandon | Published: 2021-06-15 | Updated: 2022-03-23

How does Heterophily Impact the Robustness of Graph Neural Networks? Theoretical Connections and Practical Implications

Authors: Jiong Zhu, Junchen Jin, Donald Loveland, Michael T. Schaub, Danai Koutra | Published: 2021-06-14 | Updated: 2022-07-23

PopSkipJump: Decision-Based Attack for Probabilistic Classifiers

Authors: Carl-Johann Simon-Gabriel, Noman Ahmed Sheikh, Andreas Krause | Published: 2021-06-14

Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network

Authors: Joon-Woo Lee, HyungChul Kang, Yongwoo Lee, Woosuk Choi, Jieun Eom, Maxim Deryabin, Eunsang Lee, Junghyun Lee, Donghoon Yoo, Young-Sik Kim, Jong-Seon No | Published: 2021-06-14