4.7 Article

De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Audio Steganography Based on Iterative Adversarial Attacks Against Convolutional Neural Networks

Junqi Wu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Hardware & Architecture

Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation

Martine De Cock et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Artificial Intelligence

Wild patterns: Ten years after the rise of adversarial machine learning

Battista Biggio et al.

PATTERN RECOGNITION (2018)

Proceedings Paper Computer Science, Interdisciplinary Applications

Attack under Disguise: An Intelligent Data Poisoning Attack Mechanism in Crowdsourcing

Chenglin Miao et al.

WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018) (2018)

Proceedings Paper Computer Science, Information Systems

Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning

Briland Hitaj et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Review Multidisciplinary Sciences

Deep learning

Yann LeCun et al.

NATURE (2015)

Proceedings Paper Computer Science, Information Systems

Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures

Matt Fredrikson et al.

CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)