参考文献

Abadi et al., 2016

Abadi, M., Chu, A., Goodfellow, I., McMahan, H. B., Mironov, I., Talwar, K., & Zhang, L. (2016). Deep learning with differential privacy. ACM SIGSAC Conference on Computer and Communications Security (pp. 308–318).

Adi et al., 2018

Adi, Y., Baum, C., Cisse, M., Pinkas, B., & Keshet, J. (2018). Turning your weakness into a strength: watermarking deep neural networks by backdooring. USENIX Security Symposium (pp. 1615–1631).

Afchar et al., 2018

Afchar, D., Nozick, V., Yamagishi, J., & Echizen, I. (2018). Mesonet: a compact facial video forgery detection network. IEEE International Workshop on Information Forensics and Security (WIFS) (pp. 1–7).

Alayrac et al., 2019

Alayrac, J.-B., Uesato, J., Huang, P.-S., Fawzi, A., Stanforth, R., & Kohli, P. (2019). Are labels required for improving adversarial robustness? Advances in Neural Information Processing Systems, 32.

Amsaleg et al., 2015

Amsaleg, L., Chelly, O., Furon, T., Girard, S., Houle, M. E., Kawarabayashi, K.-i., & Nett, M. (2015). Estimating local intrinsic dimensionality. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 29–38).

Andriushchenko et al., 2020

Andriushchenko, M., Croce, F., Flammarion, N., & Hein, M. (2020). Square attack: a query-efficient black-box adversarial attack via random search. European Conference on Computer Vision (pp. 484–501).

Aono et al., 2017

Aono, Y., Hayashi, T., Wang, L., Moriai, S., & others. (2017). Privacy-preserving deep learning via additively homomorphic encryption. IEEE Transactions on Information Forensics and Security, 13(5), 1333–1345.

Ateniese et al., 2015

Ateniese, G., Mancini, L. V., Spognardi, A., Villani, A., Vitali, D., & Felici, G. (2015). Hacking smart machines with smarter ones: how to extract meaningful data from machine learning classifiers. International Journal of Security and Networks, 10(3), 137–150.

Athalye et al., 2018a

Athalye, A., Carlini, N., & Wagner, D. (2018). Obfuscated gradients give a false sense of security: circumventing defenses to adversarial examples. International Conference on Machine Learning (pp. 274–283).

Athalye et al., 2018b

Athalye, A., Engstrom, L., Ilyas, A., & Kwok, K. (2018). Synthesizing robust adversarial examples. International Conference on Machine Learning (pp. 284–293).

Bagdasaryan et al., 2020

Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., & Shmatikov, V. (2020). How to backdoor federated learning. International Conference on Artificial Intelligence and Statistics (pp. 2938–2948).

Barreno et al., 2006

Barreno, M., Nelson, B., Sears, R., Joseph, A. D., & Tygar, J. D. (2006). Can machine learning be secure? ACM Symposium on Information, Computer and Communications Security (pp. 16–25).

Basu et al., 2021

Basu, S., Pope, P., & Feizi, S. (2021). Influence functions in deep learning are fragile. International Conference on Learning Representations.

Belghazi et al., 2018

Belghazi, M. I., Baratin, A., Rajeswar, S., Ozair, S., Bengio, Y., Courville, A., & Hjelm, R. D. (2018). Mine: mutual information neural estimation. arXiv preprint arXiv:1801.04062.

Bendale & Boult, 2016

Bendale, A., & Boult, T. E. (2016). Towards open set deep networks. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 1563–1572).

Bender et al., 2018

Bender, G., Kindermans, P.-J., Zoph, B., Vasudevan, V., & Le, Q. (2018). Understanding and simplifying one-shot architecture search. International Conference on Machine Learning (pp. 550–559).

Bengio & others, 2009

Bengio, Y., & others. (2009). Learning deep architectures for ai. Foundations and trends® in Machine Learning, 2(1), 1–127.

Bhagoji et al., 2017

Bhagoji, A. N., Cullina, D., & Mittal, P. (2017). Dimensionality reduction as a defense against evasion attacks on machine learning classifiers. arXiv preprint arXiv:1704.02654, 2(1).

Bhojanapalli et al., 2021

Bhojanapalli, S., Chakrabarti, A., Glasner, D., Li, D., Unterthiner, T., & Veit, A. (2021). Understanding robustness of transformers for image classification. IEEE/CVF International Conference on Computer Vision (pp. 10231–10241).

Biggio et al., 2013

Biggio, B., Corona, I., Maiorca, D., Nelson, B., Šrndić, N., Laskov, P., … Roli, F. (2013). Evasion attacks against machine learning at test time. Joint European Conference on Machine Learning and Knowledge Discovery in Databases (pp. 387–402).

Biggio et al., 2012

Biggio, B., Nelson, B., & Laskov, P. (2012). Poisoning attacks against support vector machines. International Conference on International Conference on Machine Learning (pp. 1467–1474). Madison, WI, USA: Omnipress.

Blanchard et al., 2017

Blanchard, P., Mhamdi, E., Guerraoui, R., & Stainer, J. (2017). Machine learning with adversaries: byzantine tolerant gradient descent. Neural Information Processing Systems.

Bone et al., 2014

Bone, D., Li, M., Black, M. P., & Narayanan, S. S. (2014). Intoxicated speech detection: a fusion framework with speaker-normalized hierarchical functionals and gmm supervectors. Computer Speech & Language, 28(2), 375–391.

Boneh et al., 2005

Boneh, D., Goh, E.-J., & Nissim, K. (2005). Evaluating 2-dnf formulas on ciphertexts. Theory of Cryptography Conference (pp. 325–341).

Borgnia et al., 2021

Borgnia, E., Cherepanova, V., Fowl, L., Ghiasi, A., Geiping, J., Goldblum, M., … Gupta, A. (2021). Strong data augmentation sanitizes poisoning and backdoor attacks without an accuracy tradeoff. IEEE International Conference on Acoustics, Speech and Signal Processing (pp. 3855–3859).

Brendel et al., 2018

Brendel, W., Rauber, J., & Bethge, M. (2018). Decision-based adversarial attacks: reliable attacks against black-box machine learning models. International Conference on Learning Representations.

Brown et al., 2017

Brown, T. B., Mané, D., Roy, A., Abadi, M., & Gilmer, J. (2017). Adversarial patch. arXiv preprint arXiv:1712.09665.

Buades et al., 2005

Buades, A., Coll, B., & Morel, J.-M. (2005). A non-local algorithm for image denoising. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 60–65).

Bunel et al., 2020

Bunel, R., Mudigonda, P., Turkaslan, I., Torr, P., Lu, J., & Kohli, P. (2020). Branch and bound for piecewise linear neural network verification. Journal of Machine Learning Research, 21(2020).

Cai et al., 2018

Cai, Q.-Z., Liu, C., & Song, D. (2018). Curriculum adversarial training. International Joint Conference on Artificial Intelligence (pp. 3740–3747).

Cao et al., 2021a

Cao, X., Jia, J., & Gong, N. Z. (2021). Ipguard: protecting intellectual property of deep neural networks via fingerprinting the classification boundary. ACM Asia Conference on Computer and Communications Security (pp. 14–25).

Cao et al., 2021b

Cao, Y., Wang, N., Xiao, C., Yang, D., Fang, J., Yang, R., … Li, B. (2021). Invisible for both camera and lidar: security of multi-sensor fusion based perception in autonomous driving under physical-world attacks. IEEE Symposium on Security and Privacy (pp. 176–194).

Carlini et al., 2020

Carlini, N., Jagielski, M., & Mironov, I. (2020). Cryptanalytic extraction of neural network models. Annual International Cryptology Conference (pp. 189–218).

Carlini et al., 2019

Carlini, N., Liu, C., Erlingsson, Ú., Kos, J., & Song, D. (2019). The secret sharer: evaluating and testing unintended memorization in neural networks. USENIX Security Symposium (pp. 267–284).

Carlini et al., 2021

Carlini, N., Tramer, F., Wallace, E., Jagielski, M., Herbert-Voss, A., Lee, K., … others. (2021). Extracting training data from large language models. USENIX Security Symposium (pp. 2633–2650).

Carlini & Wagner, 2016

Carlini, N., & Wagner, D. (2016). Defensive distillation is not robust to adversarial examples. arXiv preprint arXiv:1607.04311.

Carlini & Wagner, 2017a

Carlini, N., & Wagner, D. (2017). Adversarial examples are not easily detected: bypassing ten detection methods. ACM Workshop on Artificial Intelligence and Security (pp. 3–14).

Carlini & Wagner, 2017b

Carlini, N., & Wagner, D. (2017). Magnet and" efficient defenses against adversarial attacks" are not robust to adversarial examples. arXiv preprint arXiv:1711.08478.

Carlini & Wagner, 2017c

Carlini, N., & Wagner, D. (2017). Towards evaluating the robustness of neural networks. IEEE Symposium on Security and Privacy (pp. 39–57).

Carmon et al., 2019

Carmon, Y., Raghunathan, A., Schmidt, L., Duchi, J. C., & Liang, P. S. (2019). Unlabeled data improves adversarial robustness. Advances in Neural Information Processing Systems, 32.

Caron et al., 2018

Caron, M., Bojanowski, P., Joulin, A., & Douze, M. (2018). Deep clustering for unsupervised learning of visual features. European Conference on Computer Vision (pp. 132–149).

Cazenavette et al., 2021

Cazenavette, G., Murdock, C., & Lucey, S. (2021). Architectural adversarial robustness: the case for deep pursuit. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 7150–7158).

Chan et al., 2022

Chan, S.-H., Dong, Y., Zhu, J., Zhang, X., & Zhou, J. (2022). Baddet: backdoor attacks on object detection. arXiv preprint arXiv:2205.14497.

Chang et al., 2000

Chang, S. G., Yu, B., & Vetterli, M. (2000). Adaptive wavelet thresholding for image denoising and compression. IEEE Transactions on Image Processing, 9(9), 1532–1546.

Chaudhuri & Monteleoni, 2008

Chaudhuri, K., & Monteleoni, C. (2008). Privacy-preserving logistic regression. Advances in Neural Information Processing Systems, 21.

Chen et al., 2018a

Chen, B., Carvalho, W., Baracaldo, N., Ludwig, H., Edwards, B., Lee, T., … Srivastava, B. (2018). Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728.

Chen et al., 2018b

Chen, F., Luo, M., Dong, Z., Li, Z., & He, X. (2018). Federated meta-learning with fast convergence and efficient communication. arXiv preprint arXiv:1802.07876.

Chen et al., 2020a

Chen, H., Zhang, B., Xue, S., Gong, X., Liu, H., Ji, R., & Doermann, D. (2020). Anti-bandit neural architecture search for model defense. European Conference on Computer Vision (pp. 70–85).

Chen et al., 2019

Chen, H., Fu, C., Zhao, J., & Koushanfar, F. (2019). Deepinspect: a black-box trojan detection and mitigation framework for deep neural networks. International Joint Conference on Artificial Intelligence (pp. 4658–4664).

Chen et al., 2022a

Chen, J., Wang, J., Peng, T., Sun, Y., Cheng, P., Ji, S., … Song, D. (2022). Copy, right? a testing framework for copyright protection of deep learning models. IEEE Symposium on Security and Privacy (pp. 824–841).

Chen et al., 2015

Chen, J., Kang, X., Liu, Y., & Wang, Z. J. (2015). Median filtering forensics based on convolutional neural networks. IEEE Signal Processing Letters, 22(11), 1849–1853.

Chen et al., 2021a

Chen, K., Meng, Y., Sun, X., Guo, S., Zhang, T., Li, J., & Fan, C. (2021). Badpre: task-agnostic backdoor attacks to pre-trained nlp foundation models. arXiv preprint arXiv:2110.02467.

Chen et al., 2022b

Chen, L., Zhang, Y., Song, Y., Liu, L., & Wang, J. (2022). Self-supervised learning of adversarial example: towards good generalizations for deepfake detection. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 18710–18719).

Chen et al., 2017a

Chen, P.-Y., Zhang, H., Sharma, Y., Yi, J., & Hsieh, C.-J. (2017). Zoo: zeroth order optimization based black-box attacks to deep neural networks without training substitute models. ACM Workshop on Artificial Intelligence and Security (pp. 15–26).

Chen et al., 2020b

Chen, R., Chen, X., Ni, B., & Ge, Y. (2020). Simswap: an efficient framework for high fidelity face swapping. ACM International Conference on Multimedia (pp. 2003–2011).

Chen et al., 2021b

Chen, T., Zhang, Z., Liu, S., Chang, S., & Wang, Z. (2021). Robust overfitting may be mitigated by properly learned smoothening. International Conference on Learning Representations.

Chen et al., 2021c

Chen, X., Salem, A., Chen, D., Backes, M., Ma, S., Shen, Q., … Zhang, Y. (2021). Badnl: backdoor attacks against nlp models with semantic-preserving improvements. Annual Computer Security Applications Conference (pp. 554–569).

Chen et al., 2017b

Chen, X., Liu, C., Li, B., Lu, K., & Song, D. (2017). Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526.

Chen et al., 2020c

Chen, Z., Wang, C., Yuan, B., & Tao, D. (2020). Puppeteergan: arbitrary portrait animation with semantic-aware appearance transformation. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 13518–13527).

Cheng et al., 2021

Cheng, K., Fan, T., Jin, Y., Liu, Y., Chen, T., Papadopoulos, D., & Yang, Q. (2021). Secureboost: a lossless federated learning framework. IEEE Intelligent Systems, 36(6), 87–98.

Cheng et al., 2019a

Cheng, M., Le, T., Chen, P.-Y., Zhang, H., Yi, J., & Hsieh, C.-J. (2019). Query-efficient hard-label black-box attack: an optimization-based approach. International Conference on Learning Representation.

Cheng et al., 2019b

Cheng, S., Dong, Y., Pang, T., Su, H., & Zhu, J. (2019). Improving black-box adversarial attacks with a transfer-based prior. Advances in Neural Information Processing Systems, 32.

Cho et al., 2014

Cho, K., Van Merriënboer, B., Bahdanau, D., & Bengio, Y. (2014). On the properties of neural machine translation: encoder-decoder approaches. arXiv preprint arXiv:1409.1259.

Cohen et al., 2019

Cohen, J., Rosenfeld, E., & Kolter, Z. (2019). Certified adversarial robustness via randomized smoothing. International Conference on Machine Learning (pp. 1310–1320).

Cortes & Vapnik, 2004

Cortes, C., & Vapnik, V. N. (2004). Support-vector networks. Machine Learning, 20, 273-297.

Croce & Hein, 2020

Croce, F., & Hein, M. (2020). Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. International Conference on Machine Learning (pp. 2206–2216).

Cubuk et al., 2019

Cubuk, E. D., Zoph, B., Mane, D., Vasudevan, V., & Le, Q. V. (2019). Autoaugment: learning augmentation strategies from data. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 113–123).

Cummins et al., 2017

Cummins, N., Schmitt, M., Amiriparian, S., Krajewski, J., & Schuller, B. (2017). “you sound ill, take the day off”: automatic recognition of speech affected by upper respiratory tract infection. IEEE Engineering in Medicine and Biology Society (pp. 3806–3809).

DarvishRouhani et al., 2019

Darvish Rouhani, B., Chen, H., & Koushanfar, F. (2019). Deepsigns: an end-to-end watermarking framework for ownership protection of deep neural networks. International Conference on Architectural Support for Programming Languages and Operating Systems (pp. 485–497).

Das et al., 2017

Das, N., Shanbhogue, M., Chen, S.-T., Hohman, F., Chen, L., Kounavis, M. E., & Chau, D. H. (2017). Keeping the bad guys out: protecting and vaccinating deep learning with jpeg compression. arXiv preprint arXiv:1705.02900.

Dathathri et al., 2018

Dathathri, S., Zheng, S., Yin, T., Murray, R. M., & Yue, Y. (2018). Detecting adversarial examples via neural fingerprinting. arXiv preprint arXiv:1803.03870.

Davis, 1976

Davis, R. (1976). Use of meta level knowledge in the construction and maintenance of large knowledge bases. Stanford University.

DePalma et al., 2021

De Palma, A., Bunel, R., Desmaison, A., Dvijotham, K., Kohli, P., Torr, P. H., & Kumar, M. P. (2021). Improved branch and bound for neural network verification via lagrangian decomposition. arXiv preprint arXiv:2104.06718.

DeGrave et al., 2021

DeGrave, A. J., Janizek, J. D., & Lee, S.-I. (2021). Ai for radiographic covid-19 detection selects shortcuts over signal. Nature Machine Intelligence, 3(7), 610–619.

Deng et al., 2009

Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., & Fei-Fei, L. (2009). Imagenet: a large-scale hierarchical image database. IEEE Conference on Computer Vision and Pattern Recognition (pp. 248–255).

Deng et al., 2019

Deng, J., Guo, J., Xue, N., & Zafeiriou, S. (2019). Arcface: additive angular margin loss for deep face recognition. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 4690–4699).

Deng et al., 2020

Deng, Y., Kamani, M. M., & Mahdavi, M. (2020). Adaptive personalized federated learning. arXiv preprint arXiv:2003.13461.

Devaguptapu et al., 2021

Devaguptapu, C., Agarwal, D., Mittal, G., Gopalani, P., & Balasubramanian, V. N. (2021). On adversarial robustness: a neural architecture search perspective. IEEE/CVF International Conference on Computer Vision (pp. 152–161).

DeVries & Taylor, 2017

DeVries, T., & Taylor, G. W. (2017). Improved regularization of convolutional neural networks with cutout. arXiv preprint arXiv:1708.04552.

Ding et al., 2019

Ding, G. W., Sharma, Y., Lui, K. Y. C., & Huang, R. (2019). Mma training: direct input space margin maximization through adversarial training. International Conference on Learning Representations.

Dolhansky et al., 2019

Dolhansky, B., Howes, R., Pflaum, B., Baram, N., & Ferrer, C. C. (2019). The deepfake detection challenge (dfdc) preview dataset. arXiv preprint arXiv:1910.08854.

Donahue et al., 2015

Donahue, J., Anne Hendricks, L., Guadarrama, S., Rohrbach, M., Venugopalan, S., Saenko, K., & Darrell, T. (2015). Long-term recurrent convolutional networks for visual recognition and description. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 2625–2634).

Dong et al., 2022

Dong, X., Bao, J., Chen, D., Zhang, T., Zhang, W., Yu, N., … Guo, B. (2022). Protecting celebrities from deepfake with identity consistency transformer. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 9468–9478).

Dong et al., 2021

Dong, X., Luu, A. T., Ji, R., & Liu, H. (2021). Towards robustness against natural language word substitutions. International Conference on Learning Representations.

Dong et al., 2020

Dong, Y., Deng, Z., Pang, T., Zhu, J., & Su, H. (2020). Adversarial distributional training for robust deep learning. Advances in Neural Information Processing Systems, 33, 8270–8283.

Dong et al., 2018

Dong, Y., Liao, F., Pang, T., Su, H., Zhu, J., Hu, X., & Li, J. (2018). Boosting adversarial attacks with momentum. IEEE Conference on Computer Vision and Pattern Recognition (pp. 9185–9193).

Dong et al., 2019

Dong, Y., Pang, T., Su, H., & Zhu, J. (2019). Evading defenses to transferable adversarial examples by translation-invariant attacks. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 4312–4321).

Dosovitskiy et al., 2021

Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., … others. (2021). An image is worth 16x16 words: transformers for image recognition at scale. International Conference on Learning Representations.

Duan et al., 2020

Duan, R., Ma, X., Wang, Y., Bailey, J., Qin, A. K., & Yang, Y. (2020). Adversarial camouflage: hiding physical-world attacks with natural styles. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 1000–1008).

Duchi et al., 2011

Duchi, J., Hazan, E., & Singer, Y. (2011). Adaptive subgradient methods for online learning and stochastic optimization. Journal of Machine Learning Research, 12(7).

Duddu et al., 2020

Duddu, V., Boutet, A., & Shejwalkar, V. (2020). Quantifying privacy leakage in graph embedding. EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (pp. 76–85).

Dwork, 2006

Dwork, C. (2006). Differential privacy. International Conference on Automata, Languages and Programming.

Dwork, 2011

Dwork, C. (2011). A firm foundation for private data analysis. Communications of the ACM, 54(1), 86–95.

Dwork et al., 2006a

Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., & Naor, M. (2006). Our data, ourselves: privacy via distributed noise generation. International Conference on the Theory and Applications of Cryptographic Techniques (pp. 486–503).

Dwork et al., 2006b

Dwork, C., McSherry, F., Nissim, K., & Smith, A. (2006). Calibrating noise to sensitivity in private data analysis. Theory of Cryptography Conference (pp. 265–284).

Dwork et al., 2014

Dwork, C., Roth, A., & others. (2014). The algorithmic foundations of differential privacy. Foundations and Trends® in Theoretical Computer Science, 9(3–4), 211–407.

Dwork et al., 2010

Dwork, C., Rothblum, G. N., & Vadhan, S. (2010). Boosting and differential privacy. IEEE Annual Symposium on Foundations of Computer Science (pp. 51–60).

Engstrom et al., 2018a

Engstrom, L., Ilyas, A., & Athalye, A. (2018). Evaluating and understanding the robustness of adversarial logit pairing. arXiv preprint arXiv:1807.10272.

Engstrom et al., 2018b

missing journal in engstrom2018rotation

Ester et al., 1996

Ester, M., Kriegel, H.-P., Sander, J., Xu, X., & others. (1996). A density-based algorithm for discovering clusters in large spatial databases with noise. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 226–231).

Eykholt et al., 2018

Eykholt, K., Evtimov, I., Fernandes, E., Li, B., Rahmati, A., Xiao, C., … Song, D. (2018). Robust physical-world attacks on deep learning visual classification. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 1625–1634).

Fallah et al., 2020

Fallah, A., Mokhtari, A., & Ozdaglar, A. (2020). Personalized federated learning: a meta-learning approach. arXiv preprint arXiv:2002.07948.

Fan & Vercauteren, 2012

Fan, J., & Vercauteren, F. (2012). Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive.

Fang et al., 2020

Fang, M., Gong, N. Z., & Liu, J. (2020). Influence function based data poisoning attacks to top-n recommender systems. The Web Conference 2020 (pp. 3019–3025).

Fawzi et al., 2016

Fawzi, A., Moosavi-Dezfooli, S.-M., & Frossard, P. (2016). Robustness of classifiers: from adversarial to random noise. Advances in Neural Information Processing Systems, 29.

Feinman et al., 2017

Feinman, R., Curtin, R. R., Shintre, S., & Gardner, A. B. (2017). Detecting adversarial samples from artifacts. arXiv preprint arXiv:1703.00410.

Feng et al., 2019

Feng, J., Cai, Q.-Z., & Zhou, Z.-H. (2019). Learning to confuse: generating training time adversarial data with auto-encoder. Advances in Neural Information Processing Systems, 32.

Fredrikson et al., 2015

Fredrikson, M., Jha, S., & Ristenpart, T. (2015). Model inversion attacks that exploit confidence information and basic countermeasures. ACM SIGSAC Conference on Computer and Communications Security (pp. 1322–1333).

Fredrikson et al., 2014

Fredrikson, M., Lantz, E., Jha, S., Lin, S., Page, D., & Ristenpart, T. (2014). Privacy in pharmacogenetics: an $\$End-to-End$\$ case study of personalized warfarin dosing. USENIX Security Symposium (pp. 17–32).

Fridrich & Kodovsky, 2012

Fridrich, J., & Kodovsky, J. (2012). Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 7(3), 868–882.

Frosst et al., 2019

Frosst, N., Papernot, N., & Hinton, G. (2019). Analyzing and improving representations with the soft nearest neighbor loss. International Conference on Machine Learning (pp. 2012–2020).

Gal et al., 2022

Gal, R., Patashnik, O., Maron, H., Bermano, A. H., Chechik, G., & Cohen-Or, D. (2022). Stylegan-nada: clip-guided domain adaptation of image generators. ACM Transactions on Graphics, 41(4), 1–13.

Gal & Ghahramani, 2016

Gal, Y., & Ghahramani, Z. (2016). A theoretically grounded application of dropout in recurrent neural networks. Advances in Neural Information Processing Systems, 29.

Garrido et al., 2014

Garrido, P., Valgaerts, L., Rehmsen, O., Thormahlen, T., Perez, P., & Theobalt, C. (2014). Automatic face reenactment. IEEE Conference on Computer Vision and Pattern Recognition (pp. 4217–4224).

Gaschnig, 1979

Gaschnig, J. (1979). Preliminary performance analysis of the prospector consultant system for mineral exploration. International Joint Conference on Artificial Intelligence (pp. 308–310).

Geiping et al., 2020

Geiping, J., Bauermeister, H., Dröge, H., & Moeller, M. (2020). Inverting gradients-how easy is it to break privacy in federated learning? Advances in Neural Information Processing Systems, 33, 16937–16947.

Geiping et al., 2021

Geiping, J., Fowl, L. H., Huang, W. R., Czaja, W., Taylor, G., Moeller, M., & Goldstein, T. (2021). Witches' brew: industrial scale data poisoning via gradient matching. International Conference on Learning Representations.

Gentry, 2009

Gentry, C. (2009). A fully homomorphic encryption scheme. Stanford university.

Ghosh et al., 2017

Ghosh, A., Kumar, H., & Sastry, P. S. (2017). Robust loss functions under label noise for deep neural networks. AAAI Conference on Artificial Intelligence.

Gilmer et al., 2019

Gilmer, J., Ford, N., Carlini, N., & Cubuk, E. (2019). Adversarial examples are a natural consequence of test error in noise. International Conference on Machine Learning (pp. 2280–2289).

Glorot et al., 2011

Glorot, X., Bordes, A., & Bengio, Y. (2011). Deep sparse rectifier neural networks. International Conference on Artificial Intelligence and Statistics (pp. 315–323).

Goldblum et al., 2020

Goldblum, M., Fowl, L., Feizi, S., & Goldstein, T. (2020). Adversarially robust distillation. AAAI Conference on Artificial Intelligence (pp. 3996–4003).

Golub & Vorst, 2000

Golub, G. H., & Van der Vorst, H. A. (2000). Eigenvalue computation in the 20th century. Journal of Computational and Applied Mathematics, 123(1-2), 35–65.

Gong et al., 2017

Gong, Z., Wang, W., & Ku, W.-S. (2017). Adversarial and clean data are not twins. arXiv preprint arXiv:1704.04960.

Goodfellow et al., 2014

Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., … Bengio, Y. (2014). Generative adversarial nets. Advances in Neural Information Processing Systems, 27.

Goodfellow et al., 2013

Goodfellow, I., Warde-Farley, D., Mirza, M., Courville, A., & Bengio, Y. (2013). Maxout networks. International Conference on Machine Learning (pp. 1319–1327).

Goodfellow et al., 2015

Goodfellow, I. J., Shlens, J., & Szegedy, C. (2015). Explaining and harnessing adversarial examples. International Conference on Learning Representations.

Gowal et al., 2019

Gowal, S., Dvijotham, K. D., Stanforth, R., Bunel, R., Qin, C., Uesato, J., … Kohli, P. (2019). Scalable verified training for provably robust image classification. International Conference on Computer Vision (pp. 4842–4851).

Gowal et al., 2021

Gowal, S., Rebuffi, S.-A., Wiles, O., Stimberg, F., Calian, D. A., & Mann, T. A. (2021). Improving robustness using generated data. Advances in Neural Information Processing Systems, 34, 4218–4233.

Gretton et al., 2012

Gretton, A., Borgwardt, K. M., Rasch, M. J., Schölkopf, B., & Smola, A. (2012). A kernel two-sample test. The Journal of Machine Learning Research, 13(1), 723–773.

Grosse et al., 2017

Grosse, K., Manoharan, P., Papernot, N., Backes, M., & McDaniel, P. (2017). On the (statistical) detection of adversarial examples. arXiv preprint arXiv:1702.06280.

Gu et al., 2017

Gu, T., Dolan-Gavitt, B., & Garg, S. (2017). Badnets: identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733.

Guerraoui et al., 2018

Guerraoui, R., Rouault, S., & others. (2018). The hidden vulnerability of distributed learning in byzantium. International Conference on Machine Learning (pp. 3521–3530).

Guo et al., 2020

Guo, M., Yang, Y., Xu, R., Liu, Z., & Lin, D. (2020). When nas meets robustness: in search of robust architectures against adversarial attacks. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 631–640).

Guo et al., 2019

Guo, W., Wang, L., Xing, X., Du, M., & Song, D. (2019). Tabor: a highly accurate approach to inspecting and restoring trojan backdoors in ai systems. arXiv preprint arXiv:1908.01763.

Gupta & Rahtu, 2019

Gupta, P., & Rahtu, E. (2019). Ciidefence: defeating adversarial attacks by fusing class-specific image inpainting and image denoising. IEEE/CVF International Conference on Computer Vision (pp. 6708–6717).

Gupta et al., 2021

Gupta, U., Stripelis, D., Lam, P. K., Thompson, P., Ambite, J. L., & Ver Steeg, G. (2021). Membership inference attacks on deep regression models for neuroimaging. Medical Imaging with Deep Learning (pp. 228–251).

Guera & Delp, 2018

Güera, D., & Delp, E. J. (2018). Deepfake video detection using recurrent neural networks. IEEE International Conference on Advanced Video and Signal-based Surveillance (pp. 1–6).

Hampel, 1974

Hampel, F. R. (1974). The influence curve and its role in robust estimation. Journal of the American Statistical Association, 69(346), 383–393.

Hartigan & Wong, 1979

Hartigan, J. A., & Wong, M. A. (1979). Algorithm as 136: a k-means clustering algorithm. Journal of the Royal Statistical Society: Series C (Applied Statistics), 28(1), 100–108.

Hayes et al., 2019

Hayes, J., Melis, L., Danezis, G., & De Cristofaro, E. (2019). Logan: membership inference attacks against generative models. Privacy Enhancing Technologies, 2019(1), 133–152.

He et al., 2021a

He, J., Erfani, S., Ma, X., Bailey, J., Chi, Y., & Hua, X.-S. (2021). Alpha-iou: a family of power intersection over union losses for bounding box regression. Advances in Neural Information Processing Systems, 34, 20230–20242.

He et al., 2022

He, K., Chen, X., Xie, S., Li, Y., Dollár, P., & Girshick, R. (2022). Masked autoencoders are scalable vision learners. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 16000–16009).

He et al., 2020

He, K., Fan, H., Wu, Y., Xie, S., & Girshick, R. (2020). Momentum contrast for unsupervised visual representation learning. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 9729–9738).

He et al., 2015

He, K., Zhang, X., Ren, S., & Sun, J. (2015). Delving deep into rectifiers: surpassing human-level performance on imagenet classification. International Conference on Computer Vision (pp. 1026–1034).

He et al., 2016

He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. IEEE Conference on Computer Vision and Pattern Recognition (pp. 770–778).

He et al., 2021b

He, X., Jia, J., Backes, M., Gong, N. Z., & Zhang, Y. (2021). Stealing links from graph neural networks. USENIX Security Symposium (pp. 2669–2686).

Hein & Andriushchenko, 2017

Hein, M., & Andriushchenko, M. (2017). Formal guarantees on the robustness of a classifier against adversarial manipulation. Advances in Neural Information Processing Systems, 30.

Hendrycks & Gimpel, 2016a

Hendrycks, D., & Gimpel, K. (2016). Early methods for detecting adversarial images. arXiv preprint arXiv:1608.00530.

Hendrycks & Gimpel, 2016b

Hendrycks, D., & Gimpel, K. (2016). Gaussian error linear units (gelus). arXiv preprint arXiv:1606.08415.

Hinton et al., 2015

Hinton, G., Vinyals, O., Dean, J., & others. (2015). Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531, 2(7).

Hinton & Salakhutdinov, 2006

Hinton, G. E., & Salakhutdinov, R. R. (2006). Reducing the dimensionality of data with neural networks. Science, 313(5786), 504–507.

Hitaj et al., 2017

Hitaj, B., Ateniese, G., & Perez-Cruz, F. (2017). Deep models under the gan: information leakage from collaborative deep learning. ACM SIGSAC Conference on Computer and Communications Security (pp. 603–618).

Ho et al., 2020

Ho, J., Jain, A., & Abbeel, P. (2020). Denoising diffusion probabilistic models. Advances in Neural Information Processing Systems, 33, 6840–6851.

Hochreiter & Schmidhuber, 1997

Hochreiter, S., & Schmidhuber, J. (1997). Long short-term memory. Neural Computation, 9(8), 1735–1780.

Homer et al., 2008

Homer, N., Szelinger, S., Redman, M., Duggan, D., Tembe, W., Muehling, J., … Craig, D. W. (2008). Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density snp genotyping microarrays. PLOS Genetics, 4(8), e1000167.

Hong et al., 2018

Hong, S., Yan, X., Huang, T. S., & Lee, H. (2018). Learning hierarchical semantic image manipulation through structured representations. Advances in Neural Information Processing Systems, 31.

Hosseini et al., 2021

Hosseini, R., Yang, X., & Xie, P. (2021). Dsrna: differentiable search of robust neural architectures. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 6196–6205).

Hu et al., 2019

Hu, S., Yu, T., Guo, C., Chao, W.-L., & Weinberger, K. Q. (2019). A new defense against adversarial images: turning a weakness into a strength. Advances in Neural Information Processing Systems, 32.

Hu et al., 2020

Hu, X., Zhang, Z., Jiang, Z., Chaudhuri, S., Yang, Z., & Nevatia, R. (2020). Span: spatial pyramid attention network for image manipulation localization. European Conference on Computer Vision (pp. 312–328).

Huang et al., 2017

Huang, G., Liu, Z., Van Der Maaten, L., & Weinberger, K. Q. (2017). Densely connected convolutional networks. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 4700–4708).

Huang et al., 2021

Huang, H., Wang, Y., Erfani, S., Gu, Q., Bailey, J., & Ma, X. (2021). Exploring architectural ingredients of adversarially robust deep neural networks. Advances in Neural Information Processing Systems, 34, 5545–5559.

Huang et al., 2020

Huang, P.-H., Yang, F.-E., & Wang, Y.-C. F. (2020). Learning identity-invariant motion representations for cross-id face reenactment. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 7084–7092).

Huang et al., 2016

Huang, R., Xu, B., Schuurmans, D., & Szepesvári, C. (2016). Learning with a strong adversary. International Conference on Learning Representations.

Ilyas et al., 2018

Ilyas, A., Engstrom, L., Athalye, A., & Lin, J. (2018). Black-box adversarial attacks with limited queries and information. International Conference on Machine Learning (pp. 2137–2146).

Ilyas et al., 2019

Ilyas, A., Santurkar, S., Tsipras, D., Engstrom, L., Tran, B., & Madry, A. (2019). Adversarial examples are not bugs, they are features. Advances in Neural Information Processing Systems, 32.

Jagielski et al., 2020

Jagielski, M., Carlini, N., Berthelot, D., Kurakin, A., & Papernot, N. (2020). High accuracy and high fidelity extraction of neural networks. USENIX Security Symposium (pp. 1345–1362).

Jagielski et al., 2018

Jagielski, M., Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C., & Li, B. (2018). Manipulating machine learning: poisoning attacks and countermeasures for regression learning. IEEE Symposium on Security and Privacy (pp. 19–35).

Jarrett et al., 2009

Jarrett, K., Kavukcuoglu, K., Ranzato, Marc'Aurelio, & LeCun, Y. (2009). What is the best multi-stage architecture for object recognition? International Conference on Computer Vision (pp. 2146–2153).

Jeong & Shin, 2020

Jeong, J., & Shin, J. (2020). Consistency regularization for certified robustness of smoothed classifiers. Advances in Neural Information Processing Systems, 33, 10558–10570.

Jeong et al., 2022

Jeong, Y., Kim, D., Min, S., Joe, S., Gwon, Y., & Choi, J. (2022). Bihpf: bilateral high-pass filters for robust deepfake detection. IEEE/CVF Winter Conference on Applications of Computer Vision (pp. 48–57).

Jia et al., 2021

Jia, H., Choquette-Choo, C. A., Chandrasekaran, V., & Papernot, N. (2021). Entangled watermarks as a defense against model extraction. USENIX Security Symposium (pp. 1937–1954).

Jia & Rinard, 2021

Jia, K., & Rinard, M. (2021). Exploiting verified neural networks via floating point numerical error. International Static Analysis Symposium (pp. 191–205).

Jia et al., 2019a

Jia, R., Raghunathan, A., Göksel, K., & Liang, P. (2019). Certified robustness to adversarial word substitutions. arXiv preprint arXiv:1909.00986.

Jia et al., 2019b

Jia, X., Wei, X., Cao, X., & Foroosh, H. (2019). Comdefend: an efficient image compression model to defend adversarial examples. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 6084–6092).

Jiang et al., 2019

Jiang, Y., Konečn\`y, J., Rush, K., & Kannan, S. (2019). Improving federated learning personalization via model agnostic meta learning. arXiv preprint arXiv:1909.12488.

Jin et al., 2019

Jin, G., Shen, S., Zhang, D., Dai, F., & Zhang, Y. (2019). Ape-gan: adversarial perturbation elimination with gan. IEEE International Conference on Acoustics, Speech and Signal Processing (pp. 3842–3846).

Jin & Wang, 2018

Jin, H., & Wang, S. (2018 , October 9). Voice-based determination of physical and emotional characteristics of users. US Patent 10,096,319.

Jin et al., 2021

Jin, X., Chen, P.-Y., Hsu, C.-Y., Yu, C.-M., & Chen, T. (2021). Cafe: catastrophic data leakage in vertical federated learning. Advances in Neural Information Processing Systems, 34, 994–1006.

Jolliffe, 2002

Jolliffe, I. T. (2002). Principal component analysis for special types of data. Springer.

Jovanovic et al., 2021

Jovanović, N., Balunović, M., Baader, M., & Vechev, M. (2021). Certified defenses: why tighter relaxations may hurt training. arXiv preprint arXiv:2102.06700.

Jumper et al., 2021

Jumper, J., Evans, R., Pritzel, A., Green, T., Figurnov, M., Ronneberger, O., … others. (2021). Highly accurate protein structure prediction with alphafold. Nature, 596(7873), 583–589.

Juuti et al., 2019

Juuti, M., Szyller, S., Marchal, S., & Asokan, N. (2019). Prada: protecting against dnn model stealing attacks. IEEE European Symposium on Security and Privacy (pp. 512–527).

Kannan et al., 2018

Kannan, H., Kurakin, A., & Goodfellow, I. (2018). Adversarial logit pairing. arXiv preprint arXiv:1803.06373.

Karimireddy et al., 2020

Karimireddy, S. P., Kale, S., Mohri, M., Reddi, S., Stich, S., & Suresh, A. T. (2020). Scaffold: stochastic controlled averaging for federated learning. International Conference on Machine Learning (pp. 5132–5143).

Kearns & Li, 1993

Kearns, M., & Li, M. (1993). Learning in the presence of malicious errors. SIAM Journal on Computing, 22(4), 807–837.

Kesarwani et al., 2018

Kesarwani, M., Mukhoty, B., Arya, V., & Mehta, S. (2018). Model extraction warning in mlaas paradigm. Annual Computer Security Applications Conference (pp. 371–380).

Kifer & Lin, 2010

Kifer, D., & Lin, B.-R. (2010). Towards an axiomatization of statistical privacy and utility. ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (pp. 147–158).

Kim et al., 2022

Kim, G., Kwon, T., & Ye, J. C. (2022). Diffusionclip: text-guided diffusion models for robust image manipulation. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 2426–2435).

Kingma & Ba, 2015

Kingma, D. P., & Ba, J. (2015). Adam: a method for stochastic optimization. International Conference on Learning Representations.

Kingma & Welling, 2013

Kingma, D. P., & Welling, M. (2013). Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114.

Koffas et al., 2021

Koffas, S., Xu, J., Conti, M., & Picek, S. (2021). Can you hear it? backdoor attacks via ultrasonic triggers. arXiv preprint arXiv:2107.14569.

Koh & Liang, 2017

Koh, P. W., & Liang, P. (2017). Understanding black-box predictions via influence functions. International Conference on Machine Learning (pp. 1885–1894).

Koh et al., 2022

Koh, P. W., Steinhardt, J., & Liang, P. (2022). Stronger data poisoning attacks break data sanitization defenses. Machine Learning, 111(1), 1–47.

Korshunova et al., 2017

Korshunova, I., Shi, W., Dambre, J., & Theis, L. (2017). Fast face-swap using convolutional neural networks. International Conference on Computer Vision (pp. 3677–3685).

Krizhevsky et al., 2017

Krizhevsky, A., Sutskever, I., & Hinton, G. E. (2017). Imagenet classification with deep convolutional neural networks. Communications of the ACM, 60(6), 84–90.

Kumar et al., 2020

Kumar, R. S. S., Nyström, M., Lambert, J., Marshall, A., Goertzel, M., Comissoneru, A., … Xia, S. (2020). Adversarial machine learning-industry perspectives. IEEE Security and Privacy Workshops (pp. 69–75).

Kurakin et al., 2016

Kurakin, A., Goodfellow, I., & Bengio, S. (2016). Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236.

Kurakin et al., 2018

Kurakin, A., Goodfellow, I. J., & Bengio, S. (2018). Adversarial examples in the physical world. Artificial Intelligence Safety and Security (pp. 99–112). Chapman and Hall/CRC.

LeMerrer et al., 2020

Le Merrer, E., Perez, P., & Trédan, G. (2020). Adversarial frontier stitching for remote neural network watermarking. Neural Computing and Applications, 32(13), 9233–9244.

Lee et al., 2018

Lee, K., Lee, K., Lee, H., & Shin, J. (2018). A simple unified framework for detecting out-of-distribution samples and adversarial attacks. Advances in Neural Information Processing Systems, 31.

Lee et al., 2020

Lee, S., Lee, J., & Park, S. (2020). Lipschitz-certifiable training with a tight outer bound. Advances in Neural Information Processing Systems, 33, 16891–16902.

Leino & Fredrikson, 2020

Leino, K., & Fredrikson, M. (2020). Stolen memories: leveraging model memorization for calibrated $\$White-Box$\$ membership inference. USENIX Security Symposium (pp. 1605–1622).

Leino et al., 2021

Leino, K., Wang, Z., & Fredrikson, M. (2021). Globally-robust neural networks. International Conference on Machine Learning (pp. 6212–6222).

Levine & Feizi, 2021

Levine, A., & Feizi, S. (2021). Deep partition aggregation: provable defense against general poisoning attacks. International Conference on Learning Representations.

Li et al., 2021a

Li, J., Xie, H., Li, J., Wang, Z., & Zhang, Y. (2021). Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 6458–6467).

Li et al., 2020a

Li, L., Bao, J., Yang, H., Chen, D., & Wen, F. (2020). Advancing high fidelity identity swapping for forgery detection. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 5074–5083).

Li et al., 2020b

Li, L., Bao, J., Zhang, T., Yang, H., Chen, D., Wen, F., & Guo, B. (2020). Face x-ray for more general face forgery detection. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 5001–5010).

Li et al., 2023

Li, L., Qi, X., Xie, T., & Li, B. (2023). Sok: certified robustness for deep neural networks. IEEE Symposium on Security and Privacy.

Li et al., 2019

Li, Q., Haque, S., Anil, C., Lucas, J., Grosse, R. B., & Jacobsen, J.-H. (2019). Preventing gradient attenuation in lipschitz constrained convolutional networks. Advances in Neural Information Processing Systems, 32.

Li et al., 2020c

Li, T., Sahu, A. K., Zaheer, M., Sanjabi, M., Talwalkar, A., & Smith, V. (2020). Federated optimization in heterogeneous networks. Proceedings of Machine Learning and Systems, 2, 429–450.

Li et al., 2020d

Li, X., Lang, Y., Chen, Y., Mao, X., He, Y., Wang, S., … Lu, Q. (2020). Sharp multiple instance learning for deepfake video detection. ACM International Conference on Multimedia (pp. 1864–1872).

Li & Li, 2017

Li, X., & Li, F. (2017). Adversarial examples detection in deep networks with convolutional filter statistics. International Conference on Computer Vision (pp. 5764–5772).

Li et al., 2021b

Li, Y., Yang, Z., Wang, Y., & Xu, C. (2021). Neural architecture dilation for adversarial robustness. Advances in Neural Information Processing Systems, 34, 29578–29589.

Li et al., 2021c

Li, Y., Lyu, X., Koren, N., Lyu, L., Li, B., & Ma, X. (2021). Anti-backdoor learning: training clean models on poisoned data. Advances in Neural Information Processing Systems, 34, 14900–14912.

Li et al., 2021d

Li, Y., Li, Y., Lv, Y., Jiang, Y., & Xia, S.-T. (2021). Hidden backdoor attack against semantic segmentation models. arXiv preprint arXiv:2103.04038.

Li et al., 2022

Li, Y., Zhong, H., Ma, X., Jiang, Y., & Xia, S.-T. (2022). Few-shot backdoor attacks on visual object tracking. arXiv preprint arXiv:2201.13178.

Li et al., 2018

Li, Y., Chang, M.-C., & Lyu, S. (2018). In ictu oculi: exposing ai created fake videos by detecting eye blinking. IEEE International Workshop on Information Forensics and Security (pp. 1–7).

Li et al., 2021e

Li, Y., Li, Y., Wu, B., Li, L., He, R., & Lyu, S. (2021). Invisible backdoor attack with sample-specific triggers. IEEE/CVF International Conference on Computer Vision (pp. 16463–16472).

Li & Lyu, 2018

Li, Y., & Lyu, S. (2018). Exposing deepfake videos by detecting face warping artifacts. arXiv preprint arXiv:1811.00656.

Liao et al., 2018

Liao, F., Liang, M., Dong, Y., Pang, T., Hu, X., & Zhu, J. (2018). Defense against adversarial attacks using high-level representation guided denoiser. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 1778–1787).

Lin et al., 2019

Lin, J., Song, C., He, K., Wang, L., & Hopcroft, J. E. (2019). Nesterov accelerated gradient and scale invariance for adversarial attacks. arXiv preprint arXiv:1908.06281.

Lin et al., 2014

Lin, T.-Y., Maire, M., Belongie, S., Hays, J., Perona, P., Ramanan, D., … Zitnick, C. L. (2014). Microsoft coco: common objects in context. European Conference on Computer Vision (pp. 740–755).

Liu et al., 2019

Liu, G., Wang, C., Peng, K., Huang, H., Li, Y., & Cheng, W. (2019). Socinf: membership inference attacks on social media health data with machine learning. IEEE Transactions on Computational Social Systems, 6(5), 907–921.

Liu et al., 2018a

Liu, K., Dolan-Gavitt, B., & Garg, S. (2018). Fine-pruning: defending against backdooring attacks on deep neural networks. International Symposium on Research in Attacks, Intrusions, and Defenses (pp. 273–294).

Liu et al., 2021

Liu, S., Lin, T., He, D., Li, F., Wang, M., Li, X., … Ding, E. (2021). Adaattn: revisit attention mechanism in arbitrary neural style transfer. International Conference on Computer Vision (pp. 6649–6658).

Liu et al., 2017

Liu, W., Wen, Y., Yu, Z., Li, M., Raj, B., & Song, L. (2017). Sphereface: deep hypersphere embedding for face recognition. IEEE Conference on Computer Vision and Pattern Recognition (pp. 212–220).

Liu et al., 2016a

Liu, W., Wen, Y., Yu, Z., & Yang, M. (2016). Large-margin softmax loss for convolutional neural networks. International Conference on Machine Learning (pp. 507–516).

Liu et al., 2022

Liu, X., Liu, Y., Chen, J., & Liu, X. (2022). Pscc-net: progressive spatio-channel correlation network for image manipulation detection and localization. IEEE Transactions on Circuits and Systems for Video Technology.

Liu et al., 2016b

Liu, Y., Chen, X., Liu, C., & Song, D. (2016). Delving into transferable adversarial examples and black-box attacks. arXiv preprint arXiv:1611.02770.

Liu et al., 2018b

Liu, Y., Ma, S., Aafer, Y., Lee, W.-C., Zhai, J., Wang, W., & Zhang, X. (2018). Trojaning attack on neural networks. Network and Distributed Systems Security Symposium.

Long et al., 2020

Long, Y., Wang, L., Bu, D., Bindschaedler, V., Wang, X., Tang, H., … Chen, K. (2020). A pragmatic approach to membership inferences on machine learning models. IEEE European Symposium on Security and Privacy (pp. 521–534).

Lukas et al., 2019

Lukas, N., Zhang, Y., & Kerschbaum, F. (2019). Deep neural network fingerprinting by conferrable adversarial examples. arXiv preprint arXiv:1912.00888.

Lyu et al., 2015

Lyu, C., Huang, K., & Liang, H.-N. (2015). A unified gradient regularization family for adversarial examples. IEEE International Conference on Data Mining (pp. 301–309).

Lyu et al., 2022

Lyu, L., Yu, H., Ma, X., Chen, C., Sun, L., Zhao, J., … Philip, S. Y. (2022). Privacy and robustness in federated learning: attacks and defenses. IEEE Transactions on Neural Networks and Learning Systems.

Ma et al., 2018

Ma, X., Li, B., Wang, Y., Erfani, S. M., Wijewickrema, S., Schoenebeck, G., … Bailey, J. (2018). Characterizing adversarial subspaces using local intrinsic dimensionality. International Conference on Learning Representations.

Madry et al., 2018

Madry, A., Makelov, A., Schmidt, L., Tsipras, D., & Vladu, A. (2018). Towards deep learning models resistant to adversarial attacks. International Conference on Learning Representations.

Mahalanobis, 1936

Mahalanobis, P. C. (1936). On the generalized distance in statistics. Proceedings of the National Institute of Sciences, 2, 49–55.

Mahloujifar & Mahmoody, 2017

Mahloujifar, S., & Mahmoody, M. (2017). Blockwise p-tampering attacks on cryptographic primitives, extractors, and learners. Theory of Cryptography Conference (pp. 245–279).

Mahloujifar et al., 2019

Mahloujifar, S., Mahmoody, M., & Mohammed, A. (2019). Universal multi-party poisoning attacks. International Conference on Machine Learning (pp. 4274–4283).

Mahmood et al., 2021

Mahmood, K., Mahmood, R., & Van Dijk, M. (2021). On the robustness of vision transformers to adversarial examples. IEEE/CVF International Conference on Computer Vision (pp. 7838–7847).

Marfoq et al., 2021

Marfoq, O., Neglia, G., Bellet, A., Kameni, L., & Vidal, R. (2021). Federated multi-task learning under a mixture of distributions. Advances in Neural Information Processing Systems, 34, 15434–15447.

Mayer & Stamm, 2019

Mayer, O., & Stamm, M. C. (2019). Forensic similarity for digital images. IEEE Transactions on Information Forensics and Security, 15, 1331–1346.

McMahan et al., 2017

McMahan, B., Moore, E., Ramage, D., Hampson, S., & y Arcas, B. A. (2017). Communication-efficient learning of deep networks from decentralized data. Artificial intelligence and statistics (pp. 1273–1282).

McMahan et al., 2016

McMahan, H. B., Moore, E., Ramage, D., & y Arcas, B. A. (2016). Federated learning of deep networks using model averaging. arXiv preprint arXiv:1602.05629, 2.

McSherry & Talwar, 2007

McSherry, F., & Talwar, K. (2007). Mechanism design via differential privacy. IEEE Annual Symposium on Foundations of Computer Science (pp. 94–103).

McSherry, 2009

McSherry, F. D. (2009). Privacy integrated queries: an extensible platform for privacy-preserving data analysis. ACM SIGMOD International Conference on Management of Data (pp. 19–30).

Melis et al., 2019

Melis, L., Song, C., De Cristofaro, E., & Shmatikov, V. (2019). Exploiting unintended feature leakage in collaborative learning. IEEE Symposium on Security and Privacy (pp. 691–706).

Meng & Chen, 2017

Meng, D., & Chen, H. (2017). Magnet: a two-pronged defense against adversarial examples. ACM SIGSAC Conference on Computer and Communications Security (pp. 135–147).

Metzen et al., 2017

Metzen, J. H., Genewein, T., Fischer, V., & Bischoff, B. (2017). On detecting adversarial perturbations. International Conference on Learning Representations.

Micikevicius et al., 2018

Micikevicius, P., Narang, S., Alben, J., Diamos, G., Elsen, E., Garcia, D., … others. (2018). Mixed precision training. International Conference on Learning Representations.

Mikolov et al., 2013

Mikolov, T., Sutskever, I., Chen, K., Corrado, G. S., & Dean, J. (2013). Distributed representations of words and phrases and their compositionality. Advances in Neural Information Processing Systems, 26.

Minsky, 1974

Minsky, M. (1974). A framework for representing knowledge.

Miyato et al., 2017

Miyato, T., Dai, A. M., & Goodfellow, I. (2017). Adversarial training methods for semi-supervised text classification. International Conference on Learning Representations.

Miyato et al., 2016

Miyato, T., Maeda, S.-i., Koyama, M., Nakae, K., & Ishii, S. (2016). Distributional smoothing with virtual adversarial training. International Conference on Learning Representations.

Moosavi-Dezfooli et al., 2016

Moosavi-Dezfooli, S.-M., Fawzi, A., & Frossard, P. (2016). Deepfool: a simple and accurate method to fool deep neural networks. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 2574–2582).

Moura & Bjorner, 2008

Moura, L. d., & Bjørner, N. (2008). Z3: an efficient smt solver. International Conference on Tools and Algorithms for the Construction and Analysis of Systems (pp. 337–340).

Munoz-Gonzalez et al., 2017

Muñoz-González, L., Biggio, B., Demontis, A., Paudice, A., Wongrassamee, V., Lupu, E. C., & Roli, F. (2017). Towards poisoning of deep learning algorithms with back-gradient optimization. ACM Workshop on Artificial Intelligence and Security (pp. 27–38).

Munoz-Gonzalez et al., 2019

Muñoz-González, L., Pfitzner, B., Russo, M., Carnerero-Cano, J., & Lupu, E. C. (2019). Poisoning attacks with generative adversarial nets. arXiv preprint arXiv:1906.07773.

Nair & Hinton, 2010

Nair, V., & Hinton, G. E. (2010). Rectified linear units improve restricted boltzmann machines. International Conference on Machine Learning.

Nasr et al., 2019a

Nasr, M., Shokri, R., & Houmansadr, A. (2019). Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning. IEEE Symposium on Security and Privacy (SP).

Nasr et al., 2019b

Nasr, M., Shokri, R., & Houmansadr, A. (2019). Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning. IEEE Symposium on Security and Privacy (pp. 739–753).

Nelson et al., 2008

Nelson, B., Barreno, M., Chi, F. J., Joseph, A. D., Rubinstein, B. I., Saini, U., … Xia, K. (2008). Exploiting machine learning to subvert your spam filter. LEET, 8(1), 9.

Nesterov, 1983

Nesterov, Y. (1983). A method for unconstrained convex minimization problem with the rate of convergence o (1/kˆ 2). Doklady ANSSSR (pp. 543–547).

Newell & Simon, 1956

Newell, A., & Simon, H. (1956). The logic theory machine–a complex information processing system. IRE Transactions on Information Theory, 2(3), 61–79.

Nguyen et al., 2019a

Nguyen, H. H., Fang, F., Yamagishi, J., & Echizen, I. (2019). Multi-task learning for detecting and segmenting manipulated facial images and videos. International Conference on Biometrics Theory, Applications and Systems (pp. 1–8).

Nguyen et al., 2019b

Nguyen, H. H., Yamagishi, J., & Echizen, I. (2019). Capsule-forensics: using capsule networks to detect forged images and videos. IEEE International Conference on Acoustics, Speech and Signal Processing (pp. 2307–2311).

Nguyen & Tran, 2020

Nguyen, T. A., & Tran, A. (2020). Input-aware dynamic backdoor attack. Advances in Neural Information Processing Systems, 33, 3454–3464.

Ning et al., 2020

Ning, X., Zhao, J., Li, W., Zhao, T., Yang, H., & Wang, Y. (2020). Multi-shot nas for discovering adversarially robust convolutional neural architectures at targeted capacities. arXiv preprint arXiv:2012.11835.

Nirkin et al., 2022

missing booktitle in FSGAN2022

Nissim et al., 2007

Nissim, K., Raskhodnikova, S., & Smith, A. (2007). Smooth sensitivity and sampling in private data analysis. ACM Symposium on Theory of Computing (pp. 75–84).

Novac et al., 2017

Novac, O. C., Novac, M., Gordan, C., Berczes, T., & Bujdosó, G. (2017). Comparative study of google android, apple ios and microsoft windows phone mobile operating systems. Engineering of Modern Electric Systems (pp. 154–159).

Nokland, 2015

Nøkland, A. (2015). Improving back-propagation by adding an adversarial gradient. arXiv preprint arXiv:1510.04189.

Oh et al., 2019

Oh, S. J., Schiele, B., & Fritz, M. (2019). Towards reverse-engineering black-box neural networks. Explainable AI: Interpreting, Explaining and Visualizing Deep Learning (pp. 121–144). Springer.

Oord et al., 2018

Oord, A. v. d., Li, Y., & Vinyals, O. (2018). Representation learning with contrastive predictive coding. arXiv preprint arXiv:1807.03748.

Orekondy et al., 2019

Orekondy, T., Schiele, B., & Fritz, M. (2019). Knockoff nets: stealing functionality of black-box models. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 4954–4963).

Pan et al., 2020

Pan, X., Zhang, M., Ji, S., & Yang, M. (2020). Privacy risks of general-purpose language models. IEEE Symposium on Security and Privacy (pp. 1314–1331).

Pan et al., 2012

Pan, X., Zhang, X., & Lyu, S. (2012). Exposing image splicing with inconsistent local noise variances. IEEE International Conference on Computational Photography (pp. 1–10).

Pang et al., 2018

Pang, T., Du, C., Dong, Y., & Zhu, J. (2018). Towards robust detection of adversarial examples. Advances in Neural Information Processing Systems, 31.

Papernot et al., 2017

Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z. B., & Swami, A. (2017). Practical black-box attacks against machine learning. ACM on Asia Conference on Computer and Communications Security (pp. 506–519).

Papernot et al., 2016a

Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z. B., & Swami, A. (2016). The limitations of deep learning in adversarial settings. IEEE European Symposium on Security and Privacy (pp. 372–387).

Papernot et al., 2016b

Papernot, N., McDaniel, P., Wu, X., Jha, S., & Swami, A. (2016). Distillation as a defense to adversarial perturbations against deep neural networks. IEEE Symposium on Security and Privacy (pp. 582–597).

Patashnik et al., 2021

Patashnik, O., Wu, Z., Shechtman, E., Cohen-Or, D., & Lischinski, D. (2021). Styleclip: text-driven manipulation of stylegan imagery. IEEE/CVF International Conference on Computer Vision (pp. 2085–2094).

Pathak et al., 2016

Pathak, D., Krahenbuhl, P., Donahue, J., Darrell, T., & Efros, A. A. (2016). Context encoders: feature learning by inpainting. IEEE Conference on Computer Vision and Pattern Recognition (pp. 2536–2544).

Phan et al., 2016

Phan, N., Wang, Y., Wu, X., & Dou, D. (2016). Differential privacy preservation for deep auto-encoders: an application of human behavior prediction. AAAI Conference on Artificial Intelligence.

Phan et al., 2017

Phan, N., Wu, X., & Dou, D. (2017). Preserving differential privacy in convolutional deep belief networks. Machine learning, 106(9), 1681–1704.

Pillutla et al., 2019

Pillutla, K., Kakade, S. M., & Harchaoui, Z. (2019). Robust aggregation for federated learning. arXiv preprint arXiv:1912.13445.

Prakash et al., 2018

Prakash, A., Moran, N., Garber, S., DiLillo, A., & Storer, J. (2018). Deflecting adversarial attacks with pixel deflection. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 8571–8580).

Pyrgelis et al., 2018

Pyrgelis, A., Troncoso, C., & Cristofaro, E. D. (2018). Knock knock, who's there? membership inference on aggregate location data. Network and Distributed System Security Symposium. The Internet Society.

Pyrgelis et al., 2020

Pyrgelis, A., Troncoso, C., & De Cristofaro, E. (2020). Measuring membership privacy on aggregate location time-series. ACM on Measurement and Analysis of Computing Systems, 4(2), 1–28.

Qi et al., 2021

Qi, F., Li, M., Chen, Y., Zhang, Z., Liu, Z., Wang, Y., & Sun, M. (2021). Hidden killer: invisible textual backdoor attacks with syntactic trigger. arXiv preprint arXiv:2105.12400.

Qian, 1999

Qian, N. (1999). On the momentum term in gradient descent learning algorithms. Neural Networks, 12(1), 145–151.

Qiao et al., 2019

Qiao, X., Yang, Y., & Li, H. (2019). Defending neural backdoors via generative distribution modeling. Advances in Neural Information Processing Systems, 32.

Qin et al., 2019

Qin, C., Martens, J., Gowal, S., Krishnan, D., Dvijotham, K., Fawzi, A., … Kohli, P. (2019). Adversarial robustness through local linearization. Advances in Neural Information Processing Systems, 32.

Radford et al., 2021

Radford, A., Kim, J. W., Hallacy, C., Ramesh, A., Goh, G., Agarwal, S., … others. (2021). Learning transferable visual models from natural language supervision. International Conference on Machine Learning (pp. 8748–8763).

Rahman & Wang, 2016

Rahman, M. A., & Wang, Y. (2016). Optimizing intersection-over-union in deep neural networks for image segmentation. International Symposium on Visual Computing (pp. 234–244).

Rahmouni et al., 2017

Rahmouni, N., Nozick, V., Yamagishi, J., & Echizen, I. (2017). Distinguishing computer graphics from natural images using convolution neural networks. IEEE Workshop on Information Forensics and Security (pp. 1–6).

Ramachandran et al., 2017

Ramachandran, P., Zoph, B., & Le, Q. V. (2017). Searching for activation functions. arXiv preprint arXiv:1710.05941.

Rebuffi et al., 2021a

Rebuffi, S.-A., Gowal, S., Calian, D. A., Stimberg, F., Wiles, O., & Mann, T. (2021). Fixing data augmentation to improve adversarial robustness. arXiv preprint arXiv:2103.01946.

Rebuffi et al., 2021b

Rebuffi, S.-A., Gowal, S., Calian, D. A., Stimberg, F., Wiles, O., & Mann, T. A. (2021). Data augmentation can improve robustness. Advances in Neural Information Processing Systems, 34, 29935–29948.

Redmon & Farhadi, 2017

Redmon, J., & Farhadi, A. (2017). Yolo9000: better, faster, stronger. IEEE Conference on Computer Vision and Pattern Recognition (pp. 7263–7271).

Rezatofighi et al., 2019

Rezatofighi, H., Tsoi, N., Gwak, J., Sadeghian, A., Reid, I., & Savarese, S. (2019). Generalized intersection over union: a metric and a loss for bounding box regression. IEEE/CVF Conference on Computer Vision and Pattern Recognition.

Rice et al., 2020

Rice, L., Wong, E., & Kolter, Z. (2020). Overfitting in adversarially robust deep learning. International Conference on Machine Learning (pp. 8093–8104).

Rivest et al., 1978

Rivest, R. L., Adleman, L., Dertouzos, M. L., & others. (1978). On data banks and privacy homomorphisms. Foundations of Secure Computation, 4(11), 169–180.

Ronneberger et al., 2015

Ronneberger, O., Fischer, P., & Brox, T. (2015). U-net: convolutional networks for biomedical image segmentation. International Conference on Medical Image Computing and Computer Assisted Intervention (pp. 234–241).

Rossler et al., 2019

Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., & Nießner, M. (2019). Faceforensics++: learning to detect manipulated facial images. International Conference on Computer Vision (pp. 1–11).

Roth et al., 2019

Roth, K., Kilcher, Y., & Hofmann, T. (2019). The odds are odd: a statistical test for detecting adversarial examples. International Conference on Machine Learning (pp. 5498–5507).

Rubinstein et al., 2009

Rubinstein, B., Nelson, B., Ling, H., Joseph, A. D., & Tygar, J. D. (2009). Antidote: understanding and defending against poisoning of anomaly detectors. Acm Sigcomm Conference on Internet Measurement.

Rudin & others, 1976

Rudin, W., & others. (1976). Principles of mathematical analysis. Vol. 3. McGraw-hill New York.

Rumelhart et al., 1986

Rumelhart, D. E., Hinton, G. E., & Williams, R. J. (1986). Learning representations by back-propagating errors. Nature, 323(6088), 533–536.

Russakovsky et al., 2015

Russakovsky, O., Deng, J., Su, H., Krause, J., Satheesh, S., Ma, S., … others. (2015). Imagenet large scale visual recognition challenge. International journal of computer vision, 115(3), 211–252.

Sabir et al., 2019

Sabir, E., Cheng, J., Jaiswal, A., AbdAlmageed, W., Masi, I., & Natarajan, P. (2019). Recurrent convolutional strategies for face manipulation detection in videos. arXiv preprint arXiv:1905.00582.

Sabour et al., 2017

Sabour, S., Frosst, N., & Hinton, G. E. (2017). Dynamic routing between capsules. Advances in Neural Information Processing Systems, 30.

Saha et al., 2020

Saha, A., Subramanya, A., & Pirsiavash, H. (2020). Hidden trigger backdoor attacks. AAAI Conference on Artificial Intelligence (pp. 11957–11965).

Salem et al., 2019

Salem, A., Zhang, Y., Humbert, M., Fritz, M., & Backes, M. (2019). Ml-leaks: model and data independent membership inference attacks and defenses on machine learning models. Network and Distributed Systems Security Symposium.

Salman et al., 2019

Salman, H., Yang, G., Zhang, H., Hsieh, C.-J., & Zhang, P. (2019). A convex relaxation barrier to tight robustness verification of neural networks. Advances in Neural Information Processing Systems, 32.

Samangouei et al., 2018

Samangouei, P., Kabkab, M., & Chellappa, R. (2018). Defense-gan: protecting classifiers against adversarial attacks using generative models. International Conference on Learning Representations.

Sattler et al., 2020

Sattler, F., Müller, K.-R., & Samek, W. (2020). Clustered federated learning: model-agnostic distributed multitask optimization under privacy constraints. IEEE Transactions on Neural Networks and Learning Systems, 32(8), 3710–3722.

Schmidt et al., 2018

Schmidt, L., Santurkar, S., Tsipras, D., Talwar, K., & Madry, A. (2018). Adversarially robust generalization requires more data. Advances in Neural Information Processing Systems, 31.

Schuller et al., 2015

Schuller, B., Steidl, S., Batliner, A., Nöth, E., Vinciarelli, A., Burkhardt, F., … others. (2015). A survey on perceived speaker traits: personality, likability, pathology, and the first challenge. Computer Speech & Language, 29(1), 100–131.

Shafahi et al., 2018

Shafahi, A., Huang, W. R., Najibi, M., Suciu, O., Studer, C., Dumitras, T., & Goldstein, T. (2018). Poison frogs! targeted clean-label poisoning attacks on neural networks. Advances in Neural Information Processing Systems, 31.

Shafahi et al., 2019

Shafahi, A., Najibi, M., Ghiasi, M. A., Xu, Z., Dickerson, J., Studer, C., … Goldstein, T. (2019). Adversarial training for free! Advances in Neural Information Processing Systems, 32.

Shafi & Silvio, 1982

Shafi, G., & Silvio, M. (1982). Probabilistic encryption & how to play mental poker keeping secret all partial information. ACM Symposium on Theory of Computing (pp. 365–377).

Shaham et al., 2015

Shaham, U., Yamada, Y., & Negahban, S. (2015). Understanding adversarial training: increasing local stability of neural nets through robust optimization. arXiv preprint arXiv:1511.05432.

Shao et al., 2021

Shao, R., Shi, Z., Yi, J., Chen, P.-Y., & Hsieh, C.-J. (2021). On the adversarial robustness of vision transformers. arXiv preprint arXiv:2103.15670.

Sharif et al., 2016

Sharif, M., Bhagavatula, S., Bauer, L., & Reiter, M. K. (2016). Accessorize to a crime: real and stealthy attacks on state-of-the-art face recognition. ACM SIGSAC Conference on Computer and Communications Security (pp. 1528–1540).

Shen et al., 2016

Shen, S., Tople, S., & Saxena, P. (2016). Auror: defending against poisoning attacks in collaborative deep learning systems. Conference on Computer Security Applications.

Shen & Sanghavi, 2019

Shen, Y., & Sanghavi, S. (2019). Learning with bad training data via iterative trimmed loss minimization. International Conference on Machine Learning (pp. 5739–5748).

Shokri et al., 2017

Shokri, R., Stronati, M., Song, C., & Shmatikov, V. (2017). Membership inference attacks against machine learning models. IEEE Symposium on Security and Privacy (pp. 3–18).

Siarohin et al., 2019

Siarohin, A., Lathuilière, S., Tulyakov, S., Ricci, E., & Sebe, N. (2019). First order motion model for image animation. Advances in Neural Information Processing Systems, 32.

Silver et al., 2016

Silver, D., Huang, A., Maddison, C. J., Guez, A., Sifre, L., Van Den Driessche, G., … others. (2016). Mastering the game of go with deep neural networks and tree search. Nature, 529(7587), 484–489.

Silver et al., 2017

Silver, D., Schrittwieser, J., Simonyan, K., Antonoglou, I., Huang, A., Guez, A., … others. (2017). Mastering the game of go without human knowledge. Nature, 550(7676), 354–359.

Simon-Gabriel et al., 2019

Simon-Gabriel, C.-J., Ollivier, Y., Bottou, L., Schölkopf, B., & Lopez-Paz, D. (2019). First-order adversarial vulnerability of neural networks and input dimension. International Conference on Machine Learning (pp. 5809–5817).

Simonyan & Zisserman, 2015

Simonyan, K., & Zisserman, A. (2015). Very deep convolutional networks for large-scale image recognition. International Conference on Learning Representations.

Singh et al., 2019a

Singh, G., Ganvir, R., Püschel, M., & Vechev, M. (2019). Beyond the single neuron convex barrier for neural network certification. Advances in Neural Information Processing Systems, 32.

Singh et al., 2019b

Singh, G., Gehr, T., Püschel, M., & Vechev, M. (2019). An abstract domain for certifying neural networks. ACM on Programming Languages, 3(POPL), 1–30.

Smith & Topin, 2018

missing journal in smith2018super

Smith et al., 2017

Smith, V., Chiang, C.-K., Sanjabi, M., & Talwalkar, A. S. (2017). Federated multi-task learning. Advances in Neural Information Processing Systems, 30.

Song et al., 2017

Song, C., Ristenpart, T., & Shmatikov, V. (2017). Machine learning models that remember too much. ACM SIGSAC Conference on Computer and Communications Security (pp. 587–601).

Song et al., 2021a

Song, J., Meng, C., & Ermon, S. (2021). Denoising diffusion implicit models. International Conference on Learning Representations.

Song et al., 2021b

Song, L., Wu, W., Fu, C., Qian, C., Loy, C. C., & He, R. (2021). Everything's talkin': pareidolia face reenactment. IEEE/CVF Conference on Computer Vision and Pattern Recognition.

Song & Mittal, 2021

Song, L., & Mittal, P. (2021). Systematic evaluation of privacy risks of machine learning models. USENIX Security Symposium (pp. 2615–2632).

Song et al., 2013

Song, S., Chaudhuri, K., & Sarwate, A. D. (2013). Stochastic gradient descent with differentially private updates. IEEE Global Conference on Signal and Information Processing (pp. 245–248).

Srivastava et al., 2014

Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., & Salakhutdinov, R. (2014). Dropout: a simple way to prevent neural networks from overfitting. Journal of Machine Learning Research, 15(1), 1929–1958.

Su et al., 2017

Su, D., Cao, J., Li, N., Bertino, E., Lyu, M., & Jin, H. (2017). Differentially private k-means clustering and a hybrid approach to private optimization. ACM Transactions on Privacy and Security, 20(4), 1–33.

Sun et al., 2022

Sun, J., Wang, X., Zhang, Y., Li, X., Zhang, Q., Liu, Y., & Wang, J. (2022). Fenerf: face editing in neural radiance fields. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 7672–7682).

Sun et al., 2019

Sun, Z., Kairouz, P., Suresh, A. T., & McMahan, H. B. (2019). Can you really backdoor federated learning? arXiv preprint arXiv:1911.07963.

Suwajanakorn et al., 2017

Suwajanakorn, S., Seitz, S. M., & Kemelmacher-Shlizerman, I. (2017). Synthesizing obama: learning lip sync from audio. ACM Transactions on Graphics, 36(4), 1–13.

Szegedy et al., 2016

Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., & Wojna, Z. (2016). Rethinking the inception architecture for computer vision. IEEE Conference on Computer Vision and Pattern Recognition (pp. 2818–2826).

Szegedy et al., 2014

Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., & Fergus, R. (2014). Intriguing properties of neural networks. International Conference on Learning Representations.

Szyller et al., 2021

Szyller, S., Atli, B. G., Marchal, S., & Asokan, N. (2021). Dawn: dynamic adversarial watermarking of neural networks. ACM International Conference on Multimedia (pp. 4417–4425).

TDinh et al., 2020

T Dinh, C., Tran, N., & Nguyen, J. (2020). Personalized federated learning with moreau envelopes. Advances in Neural Information Processing Systems, 33, 21394–21405.

Tan & Le, 2019

Tan, M., & Le, Q. (2019). Efficientnet: rethinking model scaling for convolutional neural networks. International Conference on Machine Learning (pp. 6105–6114).

Tanay & Griffin, 2016

Tanay, T., & Griffin, L. (2016). A boundary tilting perspective on the phenomenon of adversarial examples. arXiv preprint arXiv:1608.07690.

Tang et al., 2020

Tang, R., Du, M., Liu, N., Yang, F., & Hu, X. (2020). An embarrassingly simple approach for trojan attack in deep neural networks. ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (pp. 218–228).

Tang et al., 2021

Tang, S., Gong, R., Wang, Y., Liu, A., Wang, J., Chen, X., … others. (2021). Robustart: benchmarking robustness on architecture design and training techniques. arXiv preprint arXiv:2109.05211.

Teng et al., 2020

Teng, J., Lee, G.-H., & Yuan, Y. (2020). \$\ell_1\$ Adversarial Robustness Certificates: a Randomized Smoothing Approach.

Thies et al., 2016

Thies, J., Zollhofer, M., Stamminger, M., Theobalt, C., & Nießner, M. (2016). Face2face: real-time face capture and reenactment of rgb videos. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 2387–2395).

Tian et al., 2018

Tian, S., Yang, G., & Cai, Y. (2018). Detecting adversarial examples through image transformation. AAAI Conference on Artificial Intelligence.

Tian et al., 2020

Tian, Y., Sun, C., Poole, B., Krishnan, D., Schmid, C., & Isola, P. (2020). What makes for good views for contrastive learning? Advances in Neural Information Processing Systems, 33, 6827–6839.

Tian et al., 2021

Tian, Y., Ren, J., Chai, M., Olszewski, K., Peng, X., Metaxas, D. N., & Tulyakov, S. (2021). A good image generator is what you need for high-resolution video synthesis. International Conference on Learning Representations.

Tieleman et al., 2012

Tieleman, T., Hinton, G., & others. (2012). Lecture 6.5-rmsprop: divide the gradient by a running average of its recent magnitude. COURSERA: Neural networks for machine learning, 4(2), 26–31.

Tramer et al., 2020

Tramer, F., Carlini, N., Brendel, W., & Madry, A. (2020). On adaptive attacks to adversarial example defenses. Advances in Neural Information Processing Systems, 33, 1633–1645.

Tramer et al., 2018

Tramèr, F., Kurakin, A., Papernot, N., Goodfellow, I., Boneh, D., & McDaniel, P. (2018). Ensemble adversarial training: attacks and defenses. International Conference on Learning Representations.

Tramer et al., 2016

Tramèr, F., Zhang, F., Juels, A., Reiter, M. K., & Ristenpart, T. (2016). Stealing machine learning models via prediction $\$APIs$\$. USENIX Security Symposium (pp. 601–618).

Tran et al., 2018

Tran, B., Li, J., & Madry, A. (2018). Spectral signatures in backdoor attacks. Advances in Neural Information Processing Systems, 31.

Truex et al., 2019

Truex, S., Liu, L., Gursoy, M. E., Yu, L., & Wei, W. (2019). Demystifying membership inference attacks in machine learning as a service. IEEE Transactions on Services Computing.

Tsuzuku et al., 2018

Tsuzuku, Y., Sato, I., & Sugiyama, M. (2018). Lipschitz-margin training: scalable certification of perturbation invariance for deep neural networks. Advances in Neural Information Processing Systems, 31.

Tu et al., 2019

Tu, C.-C., Ting, P., Chen, P.-Y., Liu, S., Zhang, H., Yi, J., … Cheng, S.-M. (2019). Autozoom: autoencoder-based zeroth order optimization method for attacking black-box neural networks. AAAI Conference on Artificial Intelligence (pp. 742–749).

Turner et al., 2018

missing journal in turner2018clean

Uchida et al., 2017

Uchida, Y., Nagai, Y., Sakazawa, S., & Satoh, Shin'ichi. (2017). Embedding watermarks into deep neural networks. ACM on International Conference on Multimedia Retrieval (pp. 269–277).

Maaten & Hinton, 2008

Van der Maaten, L., & Hinton, G. (2008). Visualizing data using t-sne. Journal of Machine Learning Research, 9(11).

Vanhaesebrouck et al., 2017

Vanhaesebrouck, P., Bellet, A., & Tommasi, M. (2017). Decentralized collaborative learning of personalized models over networks. Artificial Intelligence and Statistics (pp. 509–517).

Vaswani et al., 2017

Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A. N., … Polosukhin, I. (2017). Attention is all you need. Advances in Neural Information Processing Systems, 30.

Wang & Gong, 2018

Wang, B., & Gong, N. Z. (2018). Stealing hyperparameters in machine learning. IEEE Symposium on Security and Privacy (pp. 36–52).

Wang et al., 2019a

Wang, B., Yao, Y., Shan, S., Li, H., Viswanath, B., Zheng, H., & Zhao, B. Y. (2019). Neural cleanse: identifying and mitigating backdoor attacks in neural networks. IEEE Symposium on Security and Privacy (pp. 707–723).

Wang et al., 2017

Wang, D., Ye, M., & Xu, J. (2017). Differentially private empirical risk minimization revisited: faster and more general. Advances in Neural Information Processing Systems, 30.

Wang et al., 2018a

Wang, H., Wang, Y., Zhou, Z., Ji, X., Gong, D., Zhou, J., … Liu, W. (2018). Cosface: large margin cosine loss for deep face recognition. IEEE Conference on Computer Vision and Pattern Recognition (pp. 5265–5274).

Wang et al., 2020a

Wang, H., Sreenivasan, K., Rajput, S., Vishwakarma, H., Agarwal, S., Sohn, J.-y., … Papailiopoulos, D. (2020). Attack of the tails: yes, you really can backdoor federated learning. Advances in Neural Information Processing Systems, 33, 16070–16084.

Wang et al., 2022a

Wang, J., Wu, Z., Ouyang, W., Han, X., Chen, J., Jiang, Y.-G., & Li, S.-N. (2022). M2tr: multi-modal multi-scale transformers for deepfake detection. International Conference on Multimedia Retrieval (pp. 615–623).

Wang et al., 2020b

Wang, R., Zhang, G., Liu, S., Chen, P.-Y., Xiong, J., & Wang, M. (2020). Practical detection of trojan neural networks: data-limited and data-free cases. European Conference on Computer Vision (pp. 222–238).

Wang et al., 2021a

Wang, S., Zhang, H., Xu, K., Lin, X., Jana, S., Hsieh, C.-J., & Kolter, J. Z. (2021). Beta-crown: efficient bound propagation with per-neuron split constraints for neural network robustness verification. Advances in Neural Information Processing Systems, 34, 29909–29921.

Wang et al., 2022b

Wang, S., Nepal, S., Abuadbba, A., Rudolph, C., & Grobler, M. (2022). Adversarial detection by latent style transformations. IEEE Transactions on Information Forensics and Security, 17, 1099–1114.

Wang et al., 2020c

Wang, S., Nepal, S., Rudolph, C., Grobler, M., Chen, S., & Chen, T. (2020). Backdoor attacks against transfer learning with pre-trained deep learning models. IEEE Transactions on Services Computing.

Wang et al., 2018b

Wang, T.-C., Liu, M.-Y., Zhu, J.-Y., Tao, A., Kautz, J., & Catanzaro, B. (2018). High-resolution image synthesis and semantic manipulation with conditional gans. IEEE Conference on Computer Vision and Pattern Recognition (pp. 8798–8807).

Wang et al., 2014

Wang, W., Dong, J., & Tan, T. (2014). Exploring dct coefficient quantization effects for local tampering detection. IEEE Transactions on Information Forensics and Security, 9(10), 1653–1666.

Wang et al., 2021b

Wang, X., Yang, Y., Deng, Y., & He, K. (2021). Adversarial training with fast gradient projection method against synonym substitution based text attacks. AAAI Conference on Artificial Intelligence (pp. 13997–14005).

Wang et al., 2019b

Wang, Y., Ma, X., Bailey, J., Yi, J., Zhou, B., & Gu, Q. (2019). On the convergence and robustness of adversarial training. International Conference on Machine Learning (pp. 6586–6595).

Wang et al., 2019c

Wang, Y., Zou, D., Yi, J., Bailey, J., Ma, X., & Gu, Q. (2019). Improving adversarial robustness requires revisiting misclassified examples. International Conference on Learning Representations.

Wen et al., 2016

Wen, Y., Zhang, K., Li, Z., & Qiao, Y. (2016). A discriminative feature learning approach for deep face recognition. European Conference on Computer Vision (pp. 499–515).

Weng et al., 2018

Weng, L., Zhang, H., Chen, H., Song, Z., Hsieh, C.-J., Daniel, L., … Dhillon, I. (2018). Towards fast computation of certified robustness for relu networks. International Conference on Machine Learning (pp. 5276–5285).

Wenger et al., 2021

Wenger, E., Passananti, J., Bhagoji, A. N., Yao, Y., Zheng, H., & Zhao, B. Y. (2021). Backdoor attacks against deep learning systems in the physical world. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 6206–6215).

Wierstra et al., 2014

Wierstra, D., Schaul, T., Glasmachers, T., Sun, Y., Peters, J., & Schmidhuber, J. (2014). Natural evolution strategies. Journal of Machine Learning Research, 15(1), 949–980.

Wold et al., 1987

Wold, S., Esbensen, K., & Geladi, P. (1987). Principal component analysis. Chemometrics and Intelligent Laboratory Systems, 2(1-3), 37–52.

Wong et al., 2020

Wong, E., Rice, L., & Kolter, J. Z. (2020). Fast is better than free: revisiting adversarial training. International Conference on Learning Representations.

Wu et al., 2021

Wu, B., Chen, J., Cai, D., He, X., & Gu, Q. (2021). Do wider neural networks really help adversarial robustness? Advances in Neural Information Processing Systems, 34, 7054–7067.

Wu et al., 2020a

Wu, C., Yang, X., Zhu, S., & Mitra, P. (2020). Mitigating backdoor attacks in federated learning. arXiv preprint arXiv:2011.01767.

Wu & Wang, 2021

Wu, D., & Wang, Y. (2021). Adversarial neuron pruning purifies backdoored deep models. Advances in Neural Information Processing Systems, 34, 16913–16925.

Wu et al., 2020b

Wu, D., Wang, Y., Xia, S.-T., Bailey, J., & Ma, X. (2020). Skip connections matter: on the transferability of adversarial examples generated with resnets. arXiv preprint arXiv:2002.05990.

Wu et al., 2020c

Wu, D., Xia, S.-T., & Wang, Y. (2020). Adversarial weight perturbation helps robust generalization. Advances in Neural Information Processing Systems, 33, 2958–2969.

Wu et al., 2019

Wu, Y., AbdAlmageed, W., & Natarajan, P. (2019). Mantra-net: manipulation tracing network for detection and localization of image forgeries with anomalous features. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 9543–9552).

Wu et al., 2020d

Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., & Philip, S. Y. (2020). A comprehensive survey on graph neural networks. IEEE Transactions on Neural Networks and Learning Systems, 32(1), 4–24.

Xi et al., 2021

Xi, Z., Pang, R., Ji, S., & Wang, T. (2021). Graph backdoor. USENIX Security Symposium (pp. 1523–1540).

Xia et al., 2021

Xia, W., Yang, Y., Xue, J.-H., & Wu, B. (2021). Tedigan: text-guided diverse face image generation and manipulation. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 2256–2265).

Xiao et al., 2018a

Xiao, C., Li, B., Zhu, J. Y., He, W., Liu, M., & Song, D. (2018). Generating adversarial examples with adversarial networks. International Joint Conference on Artificial Intelligence (pp. 3905–3911).

Xiao et al., 2018b

Xiao, K. Y., Tjeng, V., Shafiullah, N. M., & Madry, A. (2018). Training for faster adversarial robustness verification via inducing relu stability. arXiv preprint arXiv:1809.03008.

Xie et al., 2021

Xie, C., Chen, M., Chen, P.-Y., & Li, B. (2021). Crfl: certifiably robust federated learning against backdoor attacks. International Conference on Machine Learning (pp. 11372–11382).

Xie et al., 2019a

Xie, C., Huang, K., Chen, P.-Y., & Li, B. (2019). Dba: distributed backdoor attacks against federated learning. International Conference on Learning Representations.

Xie et al., 2020

Xie, C., Tan, M., Gong, B., Yuille, A., & Le, Q. V. (2020). Smooth adversarial training. arXiv preprint arXiv:2006.14536.

Xie et al., 2018

Xie, C., Wang, J., Zhang, Z., Ren, Z., & Yuille, A. (2018). Mitigating adversarial effects through randomization. International Conference on Learning Representations.

Xie et al., 2019b

Xie, C., Wu, Y., Maaten, L. v. d., Yuille, A. L., & He, K. (2019). Feature denoising for improving adversarial robustness. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 501–509).

Xie et al., 2019c

Xie, C., Zhang, Z., Zhou, Y., Bai, S., Wang, J., Ren, Z., & Yuille, A. L. (2019). Improving transferability of adversarial examples with input diversity. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 2730–2739).

Xu et al., 2021

Xu, J., Xue, M., & Picek, S. (2021). Explainability-based backdoor attacks against graph neural networks. ACM Workshop on Wireless Security and Machine Learning (pp. 31–36).

Xu et al., 2020

Xu, K., Zhang, G., Liu, S., Fan, Q., Sun, M., Chen, H., … Lin, X. (2020). Adversarial t-shirt! evading person detectors in a physical world. European Conference on Computer Vision (pp. 665–681).

Xu et al., 2018

Xu, W., Evans, D., & Qi, Y. (2018). Feature squeezing: detecting adversarial examples in deep neural networks. Network and Distributed Systems Security Symposium.

Xu et al., 2022

Xu, Y., Yin, Y., Jiang, L., Wu, Q., Zheng, C., Loy, C. C., … Wu, W. (2022). Transeditor: transformer-based dual-space gan for highly controllable facial editing. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 7683–7692).

Yang et al., 2017

Yang, C., Wu, Q., Li, H., & Chen, Y. (2017). Generative poisoning attack method against neural networks. arXiv preprint arXiv:1703.01340.

Yang et al., 2020

Yang, G., Duan, T., Hu, J. E., Salman, H., Razenshteyn, I., & Li, J. (2020). Randomized smoothing of all shapes and sizes. International Conference on Machine Learning (pp. 10693–10705).

Yang et al., 2019a

Yang, Q., Liu, Y., Chen, T., & Tong, Y. (2019). Federated machine learning: concept and applications. ACM Transactions on Intelligent Systems and Technology, 10(2), 1–19.

Yang et al., 2019b

Yang, S., Ren, B., Zhou, X., & Liu, L. (2019). Parallel distributed logistic regression for vertical federated learning without third-party coordinator. arXiv preprint arXiv:1911.09824.

Yang et al., 2022

Yang, Y., Liu, T. Y., & Mirzasoleiman, B. (2022). Not all poisons are created equal: robust training against data poisoning. International Conference on Machine Learning (pp. 25154–25165).

Yao, 1982

Yao, A. C. (1982). Protocols for secure computations. IEEE Annual Symposium on Foundations of Computer Science (pp. 160–164).

Yao et al., 2019

Yao, Y., Li, H., Zheng, H., & Zhao, B. Y. (2019). Latent backdoor attacks on deep neural networks. ACM SIGSAC Conference on Computer and Communications Security (pp. 2041–2055).

Ye et al., 2022

Ye, J., Liu, X., You, Z., Li, G., & Liu, B. (2022). Drinet: dynamic backdoor attack against automatic speech recognization models. Applied Sciences, 12(12), 5786.

Yeom et al., 2018

Yeom, S., Giacomelli, I., Fredrikson, M., & Jha, S. (2018). Privacy risk in machine learning: analyzing the connection to overfitting. IEEE Computer Security Foundations Symposium (pp. 268–282).

Yin et al., 2018

Yin, D., Chen, Y., Kannan, R., & Bartlett, P. (2018). Byzantine-robust distributed learning: towards optimal statistical rates. International Conference on Machine Learning (pp. 5650–5659).

Yin et al., 2021

Yin, H., Mallya, A., Vahdat, A., Alvarez, J. M., Kautz, J., & Molchanov, P. (2021). See through gradients: image batch recovery via gradinversion. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 16337–16346).

Yu et al., 2020

Yu, H., Yang, K., Zhang, T., Tsai, Y.-Y., Ho, T.-Y., & Jin, Y. (2020). Cloudleak: large-scale deep learning models stealing through adversarial examples. Network and Distributed System Security Symposium.

Yu et al., 2016

Yu, J., Jiang, Y., Wang, Z., Cao, Z., & Huang, T. (2016). Unitbox: an advanced object detection network. ACM International Conference on Multimedia.

Yu et al., 2022

Yu, S., Tack, J., Mo, S., Kim, H., Kim, J., Ha, J.-W., & Shin, J. (2022). Generating videos with dynamics-aware implicit generative adversarial networks. arXiv preprint arXiv:2202.10571.

Yuan et al., 2022

Yuan, X., Ding, L., Zhang, L., Li, X., & Wu, D. O. (2022). Es attack: model stealing against deep neural networks without data hurdles. IEEE Transactions on Emerging Topics in Computational Intelligence.

Yun et al., 2019

Yun, S., Han, D., Oh, S. J., Chun, S., Choe, J., & Yoo, Y. (2019). Cutmix: regularization strategy to train strong classifiers with localizable features. International Conference on Computer Vision (pp. 6023–6032).

Zeiler, 2012

Zeiler, M. D. (2012). Adadelta: an adaptive learning rate method. arXiv preprint arXiv:1212.5701.

Zhai et al., 2021

Zhai, T., Li, Y., Zhang, Z., Wu, B., Jiang, Y., & Xia, S.-T. (2021). Backdoor attack against speaker verification. IEEE International Conference on Acoustics, Speech and Signal Processing (pp. 2560–2564).

Zhang et al., 2021a

Zhang, B., Lu, Z., Cai, T., He, D., & Wang, L. (2021). Towards certifying \$\ell_\infty\$ robustness using Neural networks with \$\ell_\infty\$-dist Neurons.

Zhang et al., 2019a

Zhang, D., Zhang, T., Lu, Y., Zhu, Z., & Dong, B. (2019). You only propagate once: accelerating adversarial training via maximal principle. Advances in Neural Information Processing Systems, 32.

Zhang et al., 2019b

Zhang, H., Yu, Y., Jiao, J., Xing, E., El Ghaoui, L., & Jordan, M. (2019). Theoretically principled trade-off between robustness and accuracy. International Conference on Machine Learning (pp. 7472–7482).

Zhang et al., 2018a

Zhang, H., Cisse, M., Dauphin, Y. N., & Lopez-Paz, D. (2018). Mixup: beyond empirical risk minimization. International Conference on Learning Representations.

Zhang et al., 2018b

Zhang, J., Gu, Z., Jang, J., Wu, H., Stoecklin, M. P., Huang, H., & Molloy, I. (2018). Protecting intellectual property of deep neural networks with watermarking. ACM Asia Conference on Computer and Communications Security (pp. 159–172).

Zhang et al., 2017

Zhang, J., Zheng, K., Mou, W., & Wang, L. (2017). Efficient private erm for smooth objectives. arXiv preprint arXiv:1703.09947.

Zhang et al., 2020a

Zhang, J., Chen, D., Liao, J., Fang, H., Zhang, W., Zhou, W., … Yu, N. (2020). Model watermarking for image processing networks. AAAI Conference on Artificial Intelligence (pp. 12805–12812).

Zhang et al., 2021b

Zhang, J., Chen, D., Liao, J., Zhang, W., Feng, H., Hua, G., & Yu, N. (2021). Deep model intellectual property protection via deep watermarking. IEEE Transactions on Pattern Analysis and Machine Intelligence.

Zhang et al., 2020b

Zhang, J., Xu, X., Han, B., Niu, G., Cui, L., Sugiyama, M., & Kankanhalli, M. (2020). Attacks which do not kill training make adversarial learning stronger. International Conference on Machine Learning (pp. 11278–11287).

Zhang et al., 2020c

Zhang, J., Zhu, J., Niu, G., Han, B., Sugiyama, M., & Kankanhalli, M. (2020). Geometry-aware instance-reweighted adversarial training. International Conference on Learning Representations.

Zhang et al., 2012

Zhang, J., Zhang, Z., Xiao, X., Yang, Y., & Winslett, M. (2012). Functional mechanism: regression analysis under differential privacy. arXiv preprint arXiv:1208.0219.

Zhang & Zhu, 2017

Zhang, R., & Zhu, Q. (2017). A game-theoretic analysis of label flipping attacks on distributed support vector machines. Conference on Information Sciences and Systems (pp. 1–6).

Zhang et al., 2018c

Zhang, X., Ji, S., & Wang, T. (2018). Differentially private releasing via deep generative model (technical report). arXiv preprint arXiv:1801.01594.

Zhang et al., 2021c

Zhang, Z., Jia, J., Wang, B., & Gong, N. Z. (2021). Backdoor attacks to graph neural networks. ACM Symposium on Access Control Models and Technologies (pp. 15–26).

Zhang & Sabuncu, 2018

Zhang, Z., & Sabuncu, M. (2018). Generalized cross entropy loss for training deep neural networks with noisy labels. Advances in Neural Information Processing Systems, 31.

Zhao et al., 2020a

Zhao, B., Mopuri, K. R., & Bilen, H. (2020). Idlg: improved deep leakage from gradients. arXiv preprint arXiv:2001.02610.

Zhao et al., 2020b

missing booktitle in zhao2020bridging

Zhao et al., 2020c

Zhao, S., Ma, X., Zheng, X., Bailey, J., Chen, J., & Jiang, Y.-G. (2020). Clean-label backdoor attacks on video recognition models. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 14443–14452).

Zheng et al., 2020a

Zheng, H., Zhang, Z., Gu, J., Lee, H., & Prakash, A. (2020). Efficient adversarial training with transferable adversarial examples. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 1181–1190).

Zheng et al., 2020b

Zheng, Z., Wang, P., Liu, W., Li, J., Ye, R., & Ren, D. (2020). Distance-iou loss: faster and better learning for bounding box regression. AAAI Conference on Artificial Intelligence (pp. 12993–13000).

Zhou et al., 2016

Zhou, B., Khosla, A., Lapedriza, A., Oliva, A., & Torralba, A. (2016). Learning deep features for discriminative localization. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 2921–2929).

Zhou et al., 2017

Zhou, P., Han, X., Morariu, V. I., & Davis, L. S. (2017). Two-stream neural networks for tampered face detection. IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (pp. 1831–1839).

Zhou et al., 2018a

Zhou, P., Han, X., Morariu, V. I., & Davis, L. S. (2018). Learning rich features for image manipulation detection. IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 1053–1061).

Zhou et al., 2018b

Zhou, Y., Song, Y., & Berg, T. L. (2018). Image2gif: generating cinemagraphs using recurrent deep q-networks. IEEE Winter Conference on Applications of Computer Vision (pp. 170–178).

Zhu et al., 2019a

Zhu, C., Huang, W. R., Li, H., Taylor, G., Studer, C., & Goldstein, T. (2019). Transferable clean-label poisoning attacks on deep neural nets. International Conference on Machine Learning (pp. 7614–7623).

Zhu et al., 2021

Zhu, J., Yao, J., Han, B., Zhang, J., Liu, T., Niu, G., … Yang, H. (2021). Reliable adversarial distillation with unreliable teachers. International Conference on Learning Representations.

Zhu & Blaschko, 2021

Zhu, J., & Blaschko, M. B. (2021). R-gap: recursive gradient attack on privacy. International Conference on Learning Representations.

Zhu et al., 2019b

Zhu, L., Liu, Z., & Han, S. (2019). Deep leakage from gradients. Advances in Neural Information Processing Systems, 32.

Zi et al., 2021

Zi, B., Zhao, S., Ma, X., & Jiang, Y.-G. (2021). Revisiting adversarial robustness distillation: robust soft labels make student better. IEEE/CVF International Conference on Computer Vision (pp. 16443–16452).

Zombori et al., 2021

missing journal in zombori2021fooling

Zou et al., 2022

Zou, Z., Zhao, R., Shi, T., Qiu, S., & Shi, Z. (2022). Castle in the sky: dynamic sky replacement and harmonization in videos. IEEE Transactions on Image Processing.

, 2020

方滨兴. (2020). 人工智能安全. BEIJING BOOK CO. INC.

et al., 2006

王珏, 周志华, & 周傲英. (2006). 机器学习及其应用. Vol. 4. 清华大学出版社有限公司.

et al., 2021

谢宸琪, 张保稳, & 易平. (2021). 人工智能模型水印研究综述. 计算机科学, 48(7), 9–16.