Picture for Fnu Suya

Fnu Suya

HAMLOCK: HArdware-Model LOgically Combined attacK

Add code
Oct 22, 2025
Viaarxiv icon

Adversarial Hubness in Multi-Modal Retrieval

Add code
Dec 18, 2024
Viaarxiv icon

Understanding Variation in Subpopulation Susceptibility to Poisoning Attacks

Add code
Nov 20, 2023
Viaarxiv icon

SoK: Pitfalls in Evaluating Black-Box Attacks

Add code
Oct 26, 2023
Figure 1 for SoK: Pitfalls in Evaluating Black-Box Attacks
Viaarxiv icon

When Can Linear Learners be Robust to Indiscriminate Poisoning Attacks?

Add code
Jul 03, 2023
Figure 1 for When Can Linear Learners be Robust to Indiscriminate Poisoning Attacks?
Figure 2 for When Can Linear Learners be Robust to Indiscriminate Poisoning Attacks?
Figure 3 for When Can Linear Learners be Robust to Indiscriminate Poisoning Attacks?
Figure 4 for When Can Linear Learners be Robust to Indiscriminate Poisoning Attacks?
Viaarxiv icon

Manipulating Transfer Learning for Property Inference

Add code
Mar 21, 2023
Figure 1 for Manipulating Transfer Learning for Property Inference
Figure 2 for Manipulating Transfer Learning for Property Inference
Figure 3 for Manipulating Transfer Learning for Property Inference
Figure 4 for Manipulating Transfer Learning for Property Inference
Viaarxiv icon

Stealthy Backdoors as Compression Artifacts

Add code
Apr 30, 2021
Figure 1 for Stealthy Backdoors as Compression Artifacts
Figure 2 for Stealthy Backdoors as Compression Artifacts
Figure 3 for Stealthy Backdoors as Compression Artifacts
Figure 4 for Stealthy Backdoors as Compression Artifacts
Viaarxiv icon

Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds

Add code
Jun 30, 2020
Figure 1 for Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds
Figure 2 for Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds
Figure 3 for Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds
Figure 4 for Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds
Viaarxiv icon

Scalable Attack on Graph Data by Injecting Vicious Nodes

Add code
Apr 22, 2020
Figure 1 for Scalable Attack on Graph Data by Injecting Vicious Nodes
Figure 2 for Scalable Attack on Graph Data by Injecting Vicious Nodes
Figure 3 for Scalable Attack on Graph Data by Injecting Vicious Nodes
Figure 4 for Scalable Attack on Graph Data by Injecting Vicious Nodes
Viaarxiv icon

Query-limited Black-box Attacks to Classifiers

Add code
Dec 23, 2017
Figure 1 for Query-limited Black-box Attacks to Classifiers
Viaarxiv icon