Navigation
  • Print
  • Share
  • Copy Url
  • Breadcrumb

    A Nostalgia Reading List for Beginners on AI Security

    Missing the innocent time but we must move forward for bigger challenges

    Xudong Pan

    A Nostalgia Reading List for Beginners on AI Security

    1. Adversarial Attacks

    1.1. Adversarial Examples (AE) & Defenses

    1.1.1. Survey

    1.1.2. Attack Side

    1.1.3. Empirical Defense

    1.1.4. Certified Defense

    1.2. Backdoor Attacks & Defenses

    1.2.1. Survey

    • TrojanZoo (huge engineering efforts with an open-sourced framework)

    1.2.2. Attack Side

    1.2.3. Defense Side

    • Fine-pruning (RAID’18,literally, pruning and finetuning, based on the hypotheized differences in activation patterns)
    • STRIP (ACSAC’19,detection, based on the hypothesis that triggered input is resilient to noise)
    • Neural Cleanse (S&P‘19,strong link between backdoor behavior, i.e., misclassification, and static trigger pattern)
    • ABS (CCS’19,neuron-level inspection)

    1.3. Poisoning Attacks

    1.3.1. Clean-Label Attacks

    1.4. Byzantine Attacks


    2. Privacy Attacks

    2.1. Membership Inference

    2.1.1. Survey

    2.1.2. Attack Side

    2.1.3. Defense Side

    2.2. Property Inference

    2.2.1. Global Property

    2.2.2. Individual Property

    2.3. Data Reconstruction

    2.3.1. Gradient-Based

    2.3.2. Weight-Based

    2.4. Model Extraction/Stealing

    2.4.1. Attack Side

    2.4.2. Defense Side


    3. Copyright Protection

    3.1. Model Watermarking

    3.1.1. Survey

    3.1.2. White-box Watermarking

    3.1.3. Black-box Watermarking

    3.2. Model Fingerprinting