A taxonomy and survey of attacks against machine learning

N Pitropakis, E Panaousis, T Giannetsos… - Computer Science …, 2019 - Elsevier
The majority of machine learning methodologies operate with the assumption that their
environment is benign. However, this assumption does not always hold, as it is often …

[PDF][PDF] Adversarially robust distillation

M Goldblum, L Fowl, S Feizi, T Goldstein - Proceedings of the AAAI …, 2020 - aaai.org
Abstract Knowledge distillation is effective for producing small, high-performance neural
networks for classification, but these small networks are vulnerable to adversarial attacks …

Model compression with adversarial robustness: A unified optimization framework

S Gui, H Wang, H Yang, C Yu… - Advances in Neural …, 2019 - proceedings.neurips.cc
Deep model compression has been extensively studied, and state-of-the-art methods can
now achieve high compression ratios with minimal accuracy loss. This paper studies model …

Elasticflow: An elastic serverless training platform for distributed deep learning

D Gu, Y Zhao, Y Zhong, Y **ong, Z Han… - Proceedings of the 28th …, 2023 - dl.acm.org
This paper proposes ElasticFlow, an elastic serverless training platform for distributed deep
learning. ElasticFlow provides a serverless interface with two distinct features:(i) users …

Research progress and challenges on application-driven adversarial examples: A survey

W Jiang, Z He, J Zhan, W Pan, D Adhikari - ACM Transactions on Cyber …, 2021 - dl.acm.org
Great progress has been made in deep learning over the past few years, which drives the
deployment of deep learning–based applications into cyber-physical systems. But the lack of …

QVIP: an ILP-based formal verification approach for quantized neural networks

Y Zhang, Z Zhao, G Chen, F Song, M Zhang… - Proceedings of the 37th …, 2022 - dl.acm.org
Deep learning has become a promising programming paradigm in software development,
owing to its surprising performance in solving many challenging tasks. Deep neural …

Adversarial machine learning attacks on multiclass classification of iot network traffic

V Pantelakis, P Bountakas, A Farao… - Proceedings of the 18th …, 2023 - dl.acm.org
Machine Learning-based Intrusion Detection Systems have been proven to be very effective
in the protection of IoT Networks. However, the expansion of Adversarial Machine Learning …

Masking adversarial damage: Finding adversarial saliency for robust and sparse network

BK Lee, J Kim, YM Ro - … of the IEEE/CVF Conference on …, 2022 - openaccess.thecvf.com
Adversarial examples provoke weak reliability and potential security issues in deep neural
networks. Although adversarial training has been widely studied to improve adversarial …

Characteristic examples: High-robustness, low-transferability fingerprinting of neural networks

S Wang, X Wang, PY Chen, P Zhao, X Lin - … Joint Conferences on …, 2021 - par.nsf.gov
This paper proposes Characteristic Examples for effectively fingerprinting deep neural
networks, featuring high-robustness to the base model against model pruning as well as low …

Towards compact and robust deep neural networks

V Sehwag, S Wang, P Mittal, S Jana - arxiv preprint arxiv:1906.06110, 2019 - arxiv.org
Deep neural networks have achieved impressive performance in many applications but their
large number of parameters lead to significant computational and storage overheads …