自然语言处理攻击(attack) 论文收集

acl 2021

Defense against Synonym Substitution-based Adversarial Attacks via Dirichlet Neighborhood Ensemble

A Sweet Rabbit Hole by DARCY: Using Honeypots to Detect Universal Trigger’s Adversarial Attacks

Rethinking Stealthiness of Backdoor Attack against NLP Models

Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution

Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger

An Empirical Study on Adversarial Attack on NMT: Languages and Positions Matter

Using Adversarial Attacks to Reveal the Statistical Bias in Machine Reading Comprehension Models

OutFlip: Generating Examples for Unknown Intent Detection with Natural Language Attack

Putting words into the system’s mouth: A targeted attack on neural machine translation using monolingual data poisoning

BERT-Defense: A Probabilistic Model Based on BERT to Combat Cognitively Inspired Orthographic Adversarial Attacks

Counter-Argument Generation by Attacking Weak Premises

aaai 2021

Bigram and Unigram Based Text Attack via Adaptive Monotonic Heuristic Search.

A Unified Multi-Scenario Attacking Network for Visual Object Tracking.

Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification.

Towards Universal Physical Attacks on Single Object Tracking.

Modeling Deep Learning Based Privacy Attacks on Physical Mail.

Beating Attackers At Their Own Games: Adversarial Example Detection Using Adversarial Gradient Directions.

Learning to Attack Real-World Models for Person Re-identification via Virtual-Guided Meta-Learning.

Defending against Contagious Attacks on a Network with Resource Reallocation.

UAG: Uncertainty-aware Attention Graph Neural Network for Defending Adversarial Attacks.

Intrinsic Certified Robustness of Bagging against Data Poisoning Attacks.

Sequential Attacks on Kalman Filter-based Forward Collision Warning Systems.

Composite Adversarial Attacks.

Exacerbating Algorithmic Bias through Fairness Attacks.

Uncertainty-Matching Graph Neural Networks to Defend Against Poisoning Attacks.

PID-Based Approach to Adversarial Attacks.

Towards Feature Space Adversarial Attack by Style Perturbation.

DeHiB: Deep Hidden Backdoor Attack on Semi-supervised Learning via Adversarial Perturbation.

Characterizing the Evasion Attackability of Multi-label Classifiers..

Are Adversarial Examples Created Equal? A Learnable Weighted Minimax Risk for Robustness under Non-uniform Attacks.

Improving Robustness to Model Inversion Attacks via Mutual Information Regularization.

Generating Natural Language Attacks in a Hard Label Black Box Setting.

Adversarial Training with Fast Gradient Projection Method against Synonym Substitution Based Text Attacks.

Enabling Fast and Universal Audio Adversarial Attack Using Generative Model.

EvaLDA: Efficient Evasion Attacks Towards Latent Dirichlet Allocation.

A Context Aware Approach for Generating Natural Language Attacks.

DeepRobust: a Platform for Adversarial Attacks and Defenses.

SkeletonVis: Interactive Visualization for Understanding Adversarial Attacks on Human Action Recognition Models.

ICLR 2021

A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Inference

Improving VAEs' Robustness to Adversarial Attack

Efficient Certified Defenses Against Patch Attacks on Image Classifiers

Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits

Effective and Efficient Vote Attack on Capsule Networks

Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples

Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks

LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial Recognition

R-GAP: Recursive Gradient Attack on Privacy

icml 2021

Just How Toxic is Data Poisoning? A Unified Benchmark for Backdoor and Data Poisoning Attacks

Making Paper Reviewing Robust to Bid Manipulation Attacks

Robust Testing and Estimation under Manipulation Attacks

Query Complexity of Adversarial Attacks

Expressive 1-Lipschitz Neural Networks for Robust Multiple Graph Learning against Adversarial Attacks

Knowledge Enhanced Machine Learning Pipeline against Diverse Adversarial Attacks

Defense against backdoor attacks via robust covariance estimation

Label-Only Membership Inference Attacks

Robust Learning for Data Poisoning Attacks

Mind the Box: l1-APGD for Sparse Adversarial Attacks on Image Classifiers

©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 217,826评论 6 506
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 92,968评论 3 395
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 164,234评论 0 354
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 58,562评论 1 293
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 67,611评论 6 392
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 51,482评论 1 302
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 40,271评论 3 418
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 39,166评论 0 276
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 45,608评论 1 314
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 37,814评论 3 336
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 39,926评论 1 348
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 35,644评论 5 346
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 41,249评论 3 329
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 31,866评论 0 22
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 32,991评论 1 269
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 48,063评论 3 370
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 44,871评论 2 354

推荐阅读更多精彩内容

  • Causal Inference with Noisy and Missing Covariates via Ma...
    hzyido阅读 401评论 0 0
  • 表情是什么,我认为表情就是表现出来的情绪。表情可以传达很多信息。高兴了当然就笑了,难过就哭了。两者是相互影响密不可...
    Persistenc_6aea阅读 125,032评论 2 7
  • 16宿命:用概率思维提高你的胜算 以前的我是风险厌恶者,不喜欢去冒险,但是人生放弃了冒险,也就放弃了无数的可能。 ...
    yichen大刀阅读 6,050评论 0 4