Adversarial Risk and the Dangers of Evaluating Against Weak Attacks Authors: Jonathan Uesato, Brendan O'Donoghue, Aaron van den Oord, Pushmeet Kohli | Published: 2018-02-15 | Updated: 2018-06-12 Adversarial LearningAdversarial LearningAdversarial attack 2018.02.15 2025.05.13 Literature Database
Stealing Hyperparameters in Machine Learning Authors: Binghui Wang, Neil Zhenqiang Gong | Published: 2018-02-14 | Updated: 2019-09-07 Privacy-Preserving Machine LearningModel Extraction AttackOptimization Strategy 2018.02.14 2025.05.13 Literature Database
Generative Models for Spear Phishing Posts on Social Media Authors: John Seymour, Philip Tully | Published: 2018-02-14 Data CollectionUser Activity AnalysisMachine Learning Method 2018.02.14 2025.05.13 Literature Database
Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks Authors: Qi Liu, Tao Liu, Zihao Liu, Yanzhi Wang, Yier Jin, Wujie Wen | Published: 2018-02-14 | Updated: 2018-03-19 Certified RobustnessAdversarial ExampleAdversarial attack 2018.02.14 2025.05.13 Literature Database
Understanding Membership Inferences on Well-Generalized Learning Models Authors: Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen | Published: 2018-02-13 Privacy Protection MechanismMembership InferenceModel Inversion 2018.02.13 2025.05.13 Literature Database
Distributed One-class Learning Authors: Ali Shahin Shamsabadi, Hamed Haddadi, Andrea Cavallaro | Published: 2018-02-10 Privacy Protection MechanismAdversarial LearningMachine Learning Method 2018.02.10 2025.05.13 Literature Database
Certified Robustness to Adversarial Examples with Differential Privacy Authors: Mathias Lecuyer, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, Suman Jana | Published: 2018-02-09 | Updated: 2019-05-29 Robustness EvaluationAdversarial ExampleAdversarial Learning 2018.02.09 2025.05.13 Literature Database
URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection Authors: Hung Le, Quang Pham, Doyen Sahoo, Steven C. H. Hoi | Published: 2018-02-09 | Updated: 2018-03-02 Membership InferenceModel InversionMachine Learning Method 2018.02.09 2025.05.13 Literature Database
Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection Authors: Andrea Paudice, Luis Muñoz-González, Andras Gyorgy, Emil C. Lupu | Published: 2018-02-08 PoisoningAdversarial attackDetection of Poisonous Data 2018.02.08 2025.05.13 Literature Database
A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines Authors: Rui Zhang, Quanyan Zhu | Published: 2018-02-07 Multi-Objective OptimizationAdversarial attackMachine Learning Method 2018.02.07 2025.05.13 Literature Database