Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models Authors: Wieland Brendel, Jonas Rauber, Matthias Bethge | Published: 2017-12-12 | Updated: 2018-02-16 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2017.12.12 2025.05.13 Literature Database
Feature Extraction and Feature Selection: Reducing Data Complexity with Apache Spark Authors: Dimitrios Sisiaridis, Olivier Markowitch | Published: 2017-12-11 Clustering methodsData PreprocessingFeature Extraction Method 2017.12.11 2025.05.13 Literature Database
Improving Malware Detection Accuracy by Extracting Icon Information Authors: Pedro Silva, Sepehr Akhavan-Masouleh, Li Li | Published: 2017-12-10 Clustering methodsMachine Learning AlgorithmImage Feature Extraction 2017.12.10 2025.05.13 Literature Database
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning Authors: Battista Biggio, Fabio Roli | Published: 2017-12-08 | Updated: 2018-07-19 PoisoningAdversarial LearningAdversarial Attack Methods 2017.12.08 2025.05.13 Literature Database
CycleGAN, a Master of Steganography Authors: Casey Chu, Andrey Zhmoginov, Mark Sandler | Published: 2017-12-08 | Updated: 2017-12-16 Certified RobustnessInformation Hiding TechniquesGenerative Adversarial Network 2017.12.08 2025.05.13 Literature Database
Generative Adversarial Perturbations Authors: Omid Poursaeed, Isay Katsman, Bicheng Gao, Serge Belongie | Published: 2017-12-06 | Updated: 2018-07-06 Certified RobustnessAdversarial Attack MethodsGenerative Adversarial Network 2017.12.06 2025.05.13 Literature Database
Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection Authors: Ruimin Sun, Xiaoyong Yuan, Pan He, Qile Zhu, Aokun Chen, Andre Gregio, Daniela Oliveira, Xiaolin Li | Published: 2017-12-04 | Updated: 2021-10-17 Backdoor DetectionMachine Learning AlgorithmDeep Learning Model 2017.12.04 2025.05.13 Literature Database
Improving Network Robustness against Adversarial Attacks with Compact Convolution Authors: Rajeev Ranjan, Swami Sankaranarayanan, Carlos D. Castillo, Rama Chellappa | Published: 2017-12-03 | Updated: 2018-03-22 Robustness Improvement MethodAdversarial ExampleAdversarial Learning 2017.12.03 2025.05.13 Literature Database
Where Classification Fails, Interpretation Rises Authors: Chanh Nguyen, Georgi Georgiev, Yujie Ji, Ting Wang | Published: 2017-12-02 FDI Attack Detection MethodsCertified RobustnessAdversarial Learning 2017.12.02 2025.05.13 Literature Database
Together or Alone: The Price of Privacy in Collaborative Learning Authors: Balazs Pejo, Qiang Tang, Gergely Biczok | Published: 2017-12-01 | Updated: 2018-08-24 Game TheoryPrivacy IssuesDifferential Privacy 2017.12.01 2025.05.13 Literature Database