In a backdoor attack on a machine learning model, an adversary produces ...
Machine learning systems that rely on training data collected from untru...
Recent studies have shown that graph convolution networks (GCNs) are
vul...
In a black-box setting, the adversary only has API access to the target ...
We study black-box attacks on machine learning classifiers where each qu...