OnCertifyingNon-uniformBoundsagainstAdversarialAttacksChenLiu1RyotaTomioka2VolkanCevher1AbstractCWattack(Carlini&Wagner,2017).MostattackmethodssearchfortheadversarialexamplebyutilizingthegradientTh...
DataPoisoningAttacksonStochasticBanditsFangLiu1NessShroff12Abstractismotivatedbymodernindustrialscaleapplicationsofma-chinelearningsystems,wheredatacollectionandpolicyStochasticmulti-armedbanditsfo...
UniversalMulti-PartyPoisoningAttacksSaeedMahloujifar1MohammadMahmoody1AmeerMohammed2Abstractsenagainstthelearner(Valiant,1985;Kearns&Li,1993;Bshoutyetal.,2002).AtightlyrelatedandmorerecentInthiswor...
AdversarialAttacksonNodeEmbeddingsviaGraphPoisoningAleksandarBojchevski1StephanGu¨nnemann1Abstract&Wagner,2017;Liangetal.,2018;Cisse´etal.,2017;Linetal.,2017;Chenetal.,2017a).Thegoalofnetworkrepr...
Black-boxAdversarialAttackswithLimitedQueriesandInformationAndrewIlyas12LoganEngstrom12AnishAthalye12JessyLin12AbstractasubstitutenetworktoemulatetheoriginalnetworkandthenAttacksthesubstitutewithfi...