Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables Authors: Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli | Published: 2018-03-12 Malware Detection MethodAdversarial Attack DetectionEncryption Technology 2018.03.12 2025.05.13 Literature Database
BEBP: An Poisoning Method Against Machine Learning Based IDSs Authors: Pan Li, Qiang Liu, Wentao Zhao, Dongxu Wang, Siqi Wang | Published: 2018-03-11 Data Generation MethodBackdoor AttackDetection of Poisonous Data 2018.03.11 2025.05.13 Literature Database
Combating Adversarial Attacks Using Sparse Representations Authors: Soorya Gopalakrishnan, Zhinus Marzi, Upamanyu Madhow, Ramtin Pedarsani | Published: 2018-03-11 | Updated: 2018-07-13 Sparse RepresentationBackdoor DetectionAdversarial Attack Detection 2018.03.11 2025.05.13 Literature Database
Variance Networks: When Expectation Does Not Meet Your Expectations Authors: Kirill Neklyudov, Dmitry Molchanov, Arsenii Ashukha, Dmitry Vetrov | Published: 2018-03-10 | Updated: 2019-02-18 Bayesian SecurityAdversarial LearningMachine Learning Application 2018.03.10 2025.05.13 Literature Database
Detecting Adversarial Examples – A Lesson from Multimedia Forensics Authors: Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme | Published: 2018-03-09 Adversarial ExampleAdversarial Example DetectionAdversarial Attack Methods 2018.03.09 2025.05.13 Literature Database
Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters Authors: Andreas Nautsch, Sergey Isadskiy, Jascha Kolberg, Marta Gomez-Barrero, Christoph Busch | Published: 2018-03-09 Data Privacy ManagementPrivacy Enhancing TechnologySpeech Recognition Process 2018.03.09 2025.05.13 Literature Database
Explaining Black-box Android Malware Detection Authors: Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli | Published: 2018-03-09 | Updated: 2018-10-29 Machine Learning TechnologyFeature Importance AnalysisStatic Malware Detection 2018.03.09 2025.05.13 Literature Database
Generating Artificial Data for Private Deep Learning Authors: Aleksei Triastcyn, Boi Faltings | Published: 2018-03-08 | Updated: 2019-04-28 Privacy TechniqueCertified RobustnessDifferential Privacy 2018.03.08 2025.05.13 Literature Database
Stochastic Activation Pruning for Robust Adversarial Defense Authors: Guneet S. Dhillon, Kamyar Azizzadenesheli, Zachary C. Lipton, Jeremy Bernstein, Jean Kossaifi, Aran Khanna, Anima Anandkumar | Published: 2018-03-05 Adversarial Example DetectionAdversarial LearningMachine Learning Technology 2018.03.05 2025.05.13 Literature Database
Label Sanitization against Label Flipping Poisoning Attacks Authors: Andrea Paudice, Luis Muñoz-González, Emil C. Lupu | Published: 2018-03-02 | Updated: 2018-10-02 Adversarial Attack AnalysisMachine Learning TechnologyDetection of Poisonous Data 2018.03.02 2025.05.13 Literature Database