AI Security Reading List

AI for IoT and Mobile

Compression

Combining or Other

Distillation

Factorization

Pruning

Quantization

Misc

Attacks and Defenses

Adversarial Examples

Attacks

Defenses

Robustness

Backdoor

Attacks

Defenses

Inference

Attacks

Defenses

Poisoning

Attacks

Defenses

Federated Learning

GAN and VAE

Interpretability and Attacks to New Scenario

ML & Differential Privacy

Multimodal

SGX, TrustZone and Crypto

Survey

Other links

Paper List of Adversarial Examples

Paper List of Network Pruning

Paper List of NLP Adversarial Examples