ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1802.03041
  4. Cited By
Detection of Adversarial Training Examples in Poisoning Attacks through
  Anomaly Detection

Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection

8 February 2018
Andrea Paudice
Luis Muñoz-González
András Gyorgy
Emil C. Lupu
    AAML
ArXivPDFHTML

Papers citing "Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection"

11 / 11 papers shown
Title
Game-Theoretic Defenses for Robust Conformal Prediction Against Adversarial Attacks in Medical Imaging
Game-Theoretic Defenses for Robust Conformal Prediction Against Adversarial Attacks in Medical Imaging
Rui Luo
Jie Bao
Zhixin Zhou
Chuangyin Dang
MedIm
AAML
139
5
0
07 Nov 2024
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning
Mohamed el Shehaby
Ashraf Matrawy
AAML
55
7
0
08 Jun 2023
Is feature selection secure against training data poisoning?
Is feature selection secure against training data poisoning?
Huang Xiao
Battista Biggio
Gavin Brown
Giorgio Fumera
Claudia Eckert
Fabio Roli
AAML
SILM
44
423
0
21 Apr 2018
Security Evaluation of Pattern Classifiers under Attack
Security Evaluation of Pattern Classifiers under Attack
Battista Biggio
Giorgio Fumera
Fabio Roli
AAML
52
442
0
02 Sep 2017
Towards Poisoning of Deep Learning Algorithms with Back-gradient
  Optimization
Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization
Luis Muñoz-González
Battista Biggio
Ambra Demontis
Andrea Paudice
Vasin Wongrassamee
Emil C. Lupu
Fabio Roli
AAML
89
628
0
29 Aug 2017
Certified Defenses for Data Poisoning Attacks
Certified Defenses for Data Poisoning Attacks
Jacob Steinhardt
Pang Wei Koh
Percy Liang
AAML
73
751
0
09 Jun 2017
Understanding Black-box Predictions via Influence Functions
Understanding Black-box Predictions via Influence Functions
Pang Wei Koh
Percy Liang
TDI
139
2,854
0
14 Mar 2017
Deceiving Google's Perspective API Built for Detecting Toxic Comments
Deceiving Google's Perspective API Built for Detecting Toxic Comments
Hossein Hosseini
Sreeram Kannan
Baosen Zhang
Radha Poovendran
AAML
35
328
0
27 Feb 2017
Data Poisoning Attacks on Factorization-Based Collaborative Filtering
Data Poisoning Attacks on Factorization-Based Collaborative Filtering
Bo Li
Yining Wang
Aarti Singh
Yevgeniy Vorobeychik
AAML
58
342
0
29 Aug 2016
Poisoning Attacks against Support Vector Machines
Poisoning Attacks against Support Vector Machines
Battista Biggio
B. Nelson
Pavel Laskov
AAML
92
1,580
0
27 Jun 2012
Security Analysis of Online Centroid Anomaly Detection
Security Analysis of Online Centroid Anomaly Detection
Marius Kloft
Pavel Laskov
78
97
0
27 Feb 2010
1