Practical Attacks Against Graph-based Clustering

Authors: Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou | Published: 2017-08-29

Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization

Authors: Luis Muñoz-González, Battista Biggio, Ambra Demontis, Andrea Paudice, Vasin Wongrassamee, Emil C. Lupu, Fabio Roli | Published: 2017-08-29

Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features

Authors: Liang Tong, Bo Li, Chen Hajaj, Chaowei Xiao, Ning Zhang, Yevgeniy Vorobeychik | Published: 2017-08-28 | Updated: 2019-05-10

On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches

Authors: Martín Abadi, Úlfar Erlingsson, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang | Published: 2017-08-26

Plausible Deniability for Privacy-Preserving Data Synthesis

Authors: Vincent Bindschaedler, Reza Shokri, Carl A. Gunter | Published: 2017-08-26

Modular Learning Component Attacks: Today’s Reality, Tomorrow’s Challenge

Authors: Xinyang Zhang, Yujie Ji, Ting Wang | Published: 2017-08-25

Knock Knock, Who’s There? Membership Inference on Aggregate Location Data

Authors: Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro | Published: 2017-08-21 | Updated: 2017-11-29

Evasion Attacks against Machine Learning at Test Time

Authors: Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio Roli | Published: 2017-08-21

Secure Search on the Cloud via Coresets and Sketches

Authors: Adi Akavia, Dan Feldman, Hayim Shaul | Published: 2017-08-19

Learning Universal Adversarial Perturbations with Generative Models

Authors: Jamie Hayes, George Danezis | Published: 2017-08-17 | Updated: 2018-01-05