“…Ye and Zhu 60 provide another simple model wherein (1) the attacker may only perturb features (i.e.,
) but not labels (i.e.,
), and (2) the probability of an attack is a function of the attacker's risk‐reward balance. Alternatively, Rios Insua et al
61 and Rios Insua et al
62 more fully explore the flexibility of the BAL framework by leveraging ARA to develop
. This pairing further generalizes the BAL framework by allowing a wide array of (even deterministic) attacks to be formally encoded as the attacker's model.…”