ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1804.00308
  4. Cited By
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for
  Regression Learning
v1v2v3 (latest)

Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning

1 April 2018
Matthew Jagielski
Alina Oprea
Battista Biggio
Chang-rui Liu
Cristina Nita-Rotaru
Yue Liu
    AAML
ArXiv (abs)PDFHTML

Papers citing "Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning"

50 / 318 papers shown
Title
Depth-2 Neural Networks Under a Data-Poisoning Attack
Depth-2 Neural Networks Under a Data-Poisoning Attack
Sayar Karmakar
Anirbit Mukherjee
Ramchandran Muthukumar
68
7
0
04 May 2020
Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness
Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness
Pu Zhao
Pin-Yu Chen
Payel Das
Karthikeyan N. Ramamurthy
Xue Lin
AAML
168
192
0
30 Apr 2020
Poisoning Attacks on Algorithmic Fairness
Poisoning Attacks on Algorithmic Fairness
David Solans
Battista Biggio
Carlos Castillo
AAML
99
82
0
15 Apr 2020
MetaPoison: Practical General-purpose Clean-label Data Poisoning
MetaPoison: Practical General-purpose Clean-label Data Poisoning
Wenjie Huang
Jonas Geiping
Liam H. Fowl
Gavin Taylor
Tom Goldstein
141
190
0
01 Apr 2020
PoisHygiene: Detecting and Mitigating Poisoning Attacks in Neural
  Networks
PoisHygiene: Detecting and Mitigating Poisoning Attacks in Neural Networks
Junfeng Guo
Zelun Kong
Cong Liu
AAML
51
1
0
24 Mar 2020
Cryptanalytic Extraction of Neural Network Models
Cryptanalytic Extraction of Neural Network Models
Nicholas Carlini
Matthew Jagielski
Ilya Mironov
FedMLMLAUMIACVAAML
174
137
0
10 Mar 2020
Dynamic Backdoor Attacks Against Machine Learning Models
Dynamic Backdoor Attacks Against Machine Learning Models
A. Salem
Rui Wen
Michael Backes
Shiqing Ma
Yang Zhang
AAML
149
279
0
07 Mar 2020
Explanation-Guided Backdoor Poisoning Attacks Against Malware
  Classifiers
Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers
Giorgio Severi
J. Meyer
Scott E. Coull
Alina Oprea
AAMLSILM
106
18
0
02 Mar 2020
Optimal Feature Manipulation Attacks Against Linear Regression
Optimal Feature Manipulation Attacks Against Linear Regression
Fuwei Li
Lifeng Lai
Shuguang Cui
AAML
64
2
0
29 Feb 2020
Entangled Watermarks as a Defense against Model Extraction
Entangled Watermarks as a Defense against Model Extraction
Hengrui Jia
Christopher A. Choquette-Choo
Varun Chandrasekaran
Nicolas Papernot
WaLMAAML
98
222
0
27 Feb 2020
The Effectiveness of Johnson-Lindenstrauss Transform for High
  Dimensional Optimization With Adversarial Outliers, and the Recovery
The Effectiveness of Johnson-Lindenstrauss Transform for High Dimensional Optimization With Adversarial Outliers, and the Recovery
Hu Ding
Ruizhe Qin
Jiawei Huang
AAML
46
0
0
27 Feb 2020
On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient
  Shaping
On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping
Sanghyun Hong
Varun Chandrasekaran
Yigitcan Kaya
Tudor Dumitras
Nicolas Papernot
AAML
99
138
0
26 Feb 2020
NNoculation: Catching BadNets in the Wild
NNoculation: Catching BadNets in the Wild
A. Veldanda
Kang Liu
Benjamin Tan
Prashanth Krishnamurthy
Farshad Khorrami
Ramesh Karri
Brendan Dolan-Gavitt
S. Garg
AAMLOnRL
82
21
0
19 Feb 2020
Influence Function based Data Poisoning Attacks to Top-N Recommender
  Systems
Influence Function based Data Poisoning Attacks to Top-N Recommender Systems
Minghong Fang
Neil Zhenqiang Gong
Jia-Wei Liu
TDI
108
155
0
19 Feb 2020
Adversarial Attacks on Linear Contextual Bandits
Adversarial Attacks on Linear Contextual Bandits
Evrard Garcelon
Baptiste Roziere
Laurent Meunier
Jean Tarbouriech
O. Teytaud
A. Lazaric
Matteo Pirotta
AAML
93
51
0
10 Feb 2020
Can't Boil This Frog: Robustness of Online-Trained Autoencoder-Based
  Anomaly Detectors to Adversarial Poisoning Attacks
Can't Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks
Moshe Kravchik
A. Shabtai
AAML
62
1
0
07 Feb 2020
Machine Learning for Predicting Epileptic Seizures Using EEG Signals: A
  Review
Machine Learning for Predicting Epileptic Seizures Using EEG Signals: A Review
Khansa Rasheed
A. Qayyum
Junaid Qadir
Shobi Sivathamboo
P. Kwan
L. Kuhlmann
T. O'Brien
Adeel Razi
87
231
0
04 Feb 2020
Adversarial Machine Learning -- Industry Perspectives
Adversarial Machine Learning -- Industry Perspectives
Ramnath Kumar
Magnus Nyström
J. Lambert
Andrew Marshall
Mario Goertzel
Andi Comissoneru
Matt Swann
Sharon Xia
AAMLSILM
111
237
0
04 Feb 2020
Secure and Robust Machine Learning for Healthcare: A Survey
Secure and Robust Machine Learning for Healthcare: A Survey
A. Qayyum
Junaid Qadir
Muhammad Bilal
Ala I. Al-Fuqaha
AAMLOOD
98
392
0
21 Jan 2020
Cronus: Robust and Heterogeneous Collaborative Learning with Black-Box
  Knowledge Transfer
Cronus: Robust and Heterogeneous Collaborative Learning with Black-Box Knowledge Transfer
Hong Chang
Virat Shejwalkar
Reza Shokri
Amir Houmansadr
FedML
99
169
0
24 Dec 2019
Towards Security Threats of Deep Learning Systems: A Survey
Towards Security Threats of Deep Learning Systems: A Survey
Yingzhe He
Guozhu Meng
Kai Chen
Xingbo Hu
Jinwen He
AAMLELM
56
14
0
28 Nov 2019
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
Minghong Fang
Xiaoyu Cao
Jinyuan Jia
Neil Zhenqiang Gong
AAMLOODFedML
135
1,137
0
26 Nov 2019
White-Box Target Attack for EEG-Based BCI Regression Problems
White-Box Target Attack for EEG-Based BCI Regression Problems
Lubin Meng
Chin-Teng Lin
T. Jung
Dongrui Wu
AAML
69
42
0
07 Nov 2019
Data Poisoning Attacks to Local Differential Privacy Protocols
Data Poisoning Attacks to Local Differential Privacy Protocols
Xiaoyu Cao
Jinyuan Jia
Neil Zhenqiang Gong
AAML
110
78
0
05 Nov 2019
Differentiable Convex Optimization Layers
Differentiable Convex Optimization Layers
Akshay Agrawal
Brandon Amos
Shane T. Barratt
Stephen P. Boyd
Steven Diamond
Zico Kolter
107
669
0
28 Oct 2019
Analyzing and Improving Neural Networks by Generating Semantic
  Counterexamples through Differentiable Rendering
Analyzing and Improving Neural Networks by Generating Semantic Counterexamples through Differentiable Rendering
Lakshya Jain
Varun Chandrasekaran
Uyeong Jang
Wilson Wu
Andrew Lee
Andy Yan
Steven Chen
S. Jha
Sanjit A. Seshia
AAML
72
11
0
02 Oct 2019
Deep Neural Rejection against Adversarial Examples
Deep Neural Rejection against Adversarial Examples
Angelo Sotgiu
Ambra Demontis
Marco Melis
Battista Biggio
Giorgio Fumera
Xiaoyi Feng
Fabio Roli
AAML
88
69
0
01 Oct 2019
Min-Max Optimization without Gradients: Convergence and Applications to
  Adversarial ML
Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML
Sijia Liu
Songtao Lu
Xiangyi Chen
Yao Feng
Kaidi Xu
Abdullah Al-Dujaili
Mingyi Hong
Una-May Obelilly
94
26
0
30 Sep 2019
Lower Bounds on Adversarial Robustness from Optimal Transport
Lower Bounds on Adversarial Robustness from Optimal Transport
A. Bhagoji
Daniel Cullina
Prateek Mittal
OODOTAAML
74
94
0
26 Sep 2019
DeepView: Visualizing Classification Boundaries of Deep Neural Networks
  as Scatter Plots Using Discriminative Dimensionality Reduction
DeepView: Visualizing Classification Boundaries of Deep Neural Networks as Scatter Plots Using Discriminative Dimensionality Reduction
Alexander Schulz
Fabian Hinder
Barbara Hammer
FAtt
26
2
0
19 Sep 2019
Defending against Machine Learning based Inference Attacks via
  Adversarial Examples: Opportunities and Challenges
Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges
Jinyuan Jia
Neil Zhenqiang Gong
AAMLSILM
87
17
0
17 Sep 2019
Big Data Analytics for Large Scale Wireless Networks: Challenges and
  Opportunities
Big Data Analytics for Large Scale Wireless Networks: Challenges and Opportunities
Hongning Dai
Raymond Chi-Wing Wong
Hao Wang
Zibin Zheng
A. Vasilakos
AI4CEGNN
65
65
0
02 Sep 2019
On the Adversarial Robustness of Subspace Learning
On the Adversarial Robustness of Subspace Learning
Fuwei Li
Lifeng Lai
Shuguang Cui
AAML
46
3
0
17 Aug 2019
Security in Brain-Computer Interfaces: State-of-the-art, opportunities,
  and future challenges
Security in Brain-Computer Interfaces: State-of-the-art, opportunities, and future challenges
Sergio López Bernal
Alberto Huertas Celdrán
Gregorio Martínez Pérez
Michael Taynnan Barros
Sasitharan Balasubramaniam
96
13
0
09 Aug 2019
The House That Knows You: User Authentication Based on IoT Data
The House That Knows You: User Authentication Based on IoT Data
Talha Ongun
Oliver Spohngellert
Alina Oprea
Cristina Nita-Rotaru
Mihai Christodorescu
Negin Salajegheh
8
12
0
01 Aug 2019
Explaining Vulnerabilities to Adversarial Machine Learning through
  Visual Analytics
Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics
Yuxin Ma
Tiankai Xie
Jundong Li
Ross Maciejewski
AAML
91
67
0
17 Jul 2019
Adversarial Security Attacks and Perturbations on Machine Learning and
  Deep Learning Methods
Adversarial Security Attacks and Perturbations on Machine Learning and Deep Learning Methods
Arif Siddiqi
AAML
64
11
0
17 Jul 2019
Helen: Maliciously Secure Coopetitive Learning for Linear Models
Helen: Maliciously Secure Coopetitive Learning for Linear Models
Wenting Zheng
Raluca A. Popa
Joseph E. Gonzalez
Ion Stoica
FedML
100
144
0
16 Jul 2019
Poisoning Attacks with Generative Adversarial Nets
Poisoning Attacks with Generative Adversarial Nets
Luis Muñoz-González
Bjarne Pfitzner
Matteo Russo
Javier Carnerero-Cano
Emil C. Lupu
AAML
97
64
0
18 Jun 2019
Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks
Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks
Yuanshun Yao
Huiying Li
Haitao Zheng
Ben Y. Zhao
AAML
55
13
0
24 May 2019
Privacy Risks of Securing Machine Learning Models against Adversarial
  Examples
Privacy Risks of Securing Machine Learning Models against Adversarial Examples
Liwei Song
Reza Shokri
Prateek Mittal
SILMMIACVAAML
99
249
0
24 May 2019
Learning to Confuse: Generating Training Time Adversarial Data with
  Auto-Encoder
Learning to Confuse: Generating Training Time Adversarial Data with Auto-Encoder
Ji Feng
Qi-Zhi Cai
Zhi Zhou
AAML
68
105
0
22 May 2019
Better the Devil you Know: An Analysis of Evasion Attacks using
  Out-of-Distribution Adversarial Examples
Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples
Vikash Sehwag
A. Bhagoji
Liwei Song
Chawin Sitawarin
Daniel Cullina
M. Chiang
Prateek Mittal
OODD
79
26
0
05 May 2019
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online
  Learning
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning
A. Salem
Apratim Bhattacharyya
Michael Backes
Mario Fritz
Yang Zhang
FedMLAAMLMIACV
96
258
0
01 Apr 2019
On the Adversarial Robustness of Multivariate Robust Estimation
On the Adversarial Robustness of Multivariate Robust Estimation
Erhan Bayraktar
Lifeng Lai
33
3
0
27 Mar 2019
Attacking Graph-based Classification via Manipulating the Graph
  Structure
Attacking Graph-based Classification via Manipulating the Graph Structure
Binghui Wang
Neil Zhenqiang Gong
AAML
109
156
0
01 Mar 2019
Evaluating Adversarial Evasion Attacks in the Context of Wireless
  Communications
Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications
Bryse Flowers
R. M. Buehrer
William C. Headley
AAML
83
127
0
01 Mar 2019
Contamination Attacks and Mitigation in Multi-Party Machine Learning
Contamination Attacks and Mitigation in Multi-Party Machine Learning
Jamie Hayes
O. Ohrimenko
AAMLFedML
119
75
0
08 Jan 2019
Stealing Neural Networks via Timing Side Channels
Stealing Neural Networks via Timing Side Channels
Vasisht Duddu
D. Samanta
D. V. Rao
V. Balas
AAMLMLAUFedML
108
135
0
31 Dec 2018
Analyzing Federated Learning through an Adversarial Lens
Analyzing Federated Learning through an Adversarial Lens
A. Bhagoji
Supriyo Chakraborty
Prateek Mittal
S. Calo
FedML
321
1,065
0
29 Nov 2018
Previous
1234567
Next