Alert button
Picture for Fnu Suya

Fnu Suya

Alert button

Understanding Variation in Subpopulation Susceptibility to Poisoning Attacks

Add code
Bookmark button
Alert button
Nov 20, 2023
Evan Rose, Fnu Suya, David Evans

Viaarxiv icon

SoK: Pitfalls in Evaluating Black-Box Attacks

Add code
Bookmark button
Alert button
Oct 26, 2023
Fnu Suya, Anshuman Suri, Tingwei Zhang, Jingtao Hong, Yuan Tian, David Evans

Viaarxiv icon

When Can Linear Learners be Robust to Indiscriminate Poisoning Attacks?

Add code
Bookmark button
Alert button
Jul 03, 2023
Fnu Suya, Xiao Zhang, Yuan Tian, David Evans

Figure 1 for When Can Linear Learners be Robust to Indiscriminate Poisoning Attacks?
Figure 2 for When Can Linear Learners be Robust to Indiscriminate Poisoning Attacks?
Figure 3 for When Can Linear Learners be Robust to Indiscriminate Poisoning Attacks?
Figure 4 for When Can Linear Learners be Robust to Indiscriminate Poisoning Attacks?
Viaarxiv icon

Manipulating Transfer Learning for Property Inference

Add code
Bookmark button
Alert button
Mar 21, 2023
Yulong Tian, Fnu Suya, Anshuman Suri, Fengyuan Xu, David Evans

Figure 1 for Manipulating Transfer Learning for Property Inference
Figure 2 for Manipulating Transfer Learning for Property Inference
Figure 3 for Manipulating Transfer Learning for Property Inference
Figure 4 for Manipulating Transfer Learning for Property Inference
Viaarxiv icon

Stealthy Backdoors as Compression Artifacts

Add code
Bookmark button
Alert button
Apr 30, 2021
Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans

Figure 1 for Stealthy Backdoors as Compression Artifacts
Figure 2 for Stealthy Backdoors as Compression Artifacts
Figure 3 for Stealthy Backdoors as Compression Artifacts
Figure 4 for Stealthy Backdoors as Compression Artifacts
Viaarxiv icon

Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds

Add code
Bookmark button
Alert button
Jun 30, 2020
Fnu Suya, Saeed Mahloujifar, David Evans, Yuan Tian

Figure 1 for Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds
Figure 2 for Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds
Figure 3 for Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds
Figure 4 for Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds
Viaarxiv icon

Scalable Attack on Graph Data by Injecting Vicious Nodes

Add code
Bookmark button
Alert button
Apr 22, 2020
Jihong Wang, Minnan Luo, Fnu Suya, Jundong Li, Zijiang Yang, Qinghua Zheng

Figure 1 for Scalable Attack on Graph Data by Injecting Vicious Nodes
Figure 2 for Scalable Attack on Graph Data by Injecting Vicious Nodes
Figure 3 for Scalable Attack on Graph Data by Injecting Vicious Nodes
Figure 4 for Scalable Attack on Graph Data by Injecting Vicious Nodes
Viaarxiv icon

Query-limited Black-box Attacks to Classifiers

Add code
Bookmark button
Alert button
Dec 23, 2017
Fnu Suya, Yuan Tian, David Evans, Paolo Papotti

Figure 1 for Query-limited Black-box Attacks to Classifiers
Viaarxiv icon