Fnu Suya
Fnu Suya
Home
News
Publications
Experience
Teaching
Service
Contact
Light
Dark
Automatic
1
SoK: Pitfalls in Evaluating Black-Box Attacks
We propose a taxonomy to categorize and better understand black-box attacks revealing unexplored threat spaces and other interesting findings, and emphasize the need to consider resource costs like attack runtime to evaluating attacks.
Fnu Suya
,
Anshuman Suri
,
Tingwei Zhang
,
Jingtao Hong
,
Yuan Tian
,
David Evans
PDF
Cite
Code
SoK: Pitfalls in Evaluating Black-Box Attacks
We propose a taxonomy to categorize and better understand black-box attacks revealing unexplored threat spaces and other interesting findings, and emphasize the need to consider resource costs like attack runtime to evaluating attacks.
Fnu Suya
,
Anshuman Suri
,
Tingwei Zhang
,
Jingtao Hong
,
Yuan Tian
,
David Evans
Last updated on Dec 20, 2023
PDF
Cite
Code
What Distributions are Robust to Indiscriminate Poisoning Attacks for Linear Learners?
We demonstrated that some data distributions can be inherently robust to poisoning, and that improving distributional quality can enhance resistance to poisoning attacks.
Fnu Suya
,
Xiao Zhang
,
Yuan Tian
,
David Evans
PDF
Cite
Poster
What Distributions are Robust to Indiscriminate Poisoning Attacks for Linear Learners?
We demonstrated that some data distributions can be inherently robust to poisoning, and that improving distributional quality can enhance resistance to poisoning attacks.
Fnu Suya
,
Xiao Zhang
,
Yuan Tian
,
David Evans
Last updated on Nov 27, 2023
PDF
Cite
Poster
Manipulating Transfer Learning for Property Inference
We introduce a method to manipulate neuron activations while pre-training models, allowing highly successful inference of sensitive properties of the victim’s downstream training data.
Yulong Tian
,
Fnu Suya
,
Anshuman Suri
,
Fengyuan Xu
,
David Evans
PDF
Cite
Code
Video
Manipulating Transfer Learning for Property Inference
We introduce a method to manipulate neuron activations while pre-training models, allowing highly successful inference of sensitive properties of the victim’s downstream training data.
Yulong Tian
,
Fnu Suya
,
Anshuman Suri
,
Fengyuan Xu
,
David Evans
Last updated on Nov 27, 2023
PDF
Cite
Code
Video
Model-Targeted Poisoning Attacks with Provable Convergence
We propose efficient data poisoning attacks that can asymptotically approach a target model with desired properties.
Fnu Suya
,
Saeed Mahloujifar
,
Anshuman Suri
,
David Evans
,
Yuan Tian
PDF
Cite
Code
Poster
Slides
Model-Targeted Poisoning Attacks with Provable Convergence
We propose efficient data poisoning attacks that can asymptotically approach a target model with desired properties.
Fnu Suya
,
Saeed Mahloujifar
,
Anshuman Suri
,
David Evans
,
Yuan Tian
Last updated on Nov 27, 2023
PDF
Cite
Code
Poster
Slides
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries
We propose query-efficient black-box attacks that innovatively combine existing methods and prioritize targeting more vulnerable seeds.
Fnu Suya
,
Jianfeng Chi
,
David Evans
,
Yuan Tian
PDF
Cite
Code
Slides
Video
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries
We propose query-efficient black-box attacks that innovatively combine existing methods and prioritize targeting more vulnerable seeds.
Fnu Suya
,
Jianfeng Chi
,
David Evans
,
Yuan Tian
Last updated on Nov 27, 2023
PDF
Cite
Code
Slides
Video
»
Cite
×