The best defense is a good offense: Countering black box attacks by predicting slightly wrong labels Authors: Yannic Kilcher, Thomas Hofmann | Published: 2017-11-15 Backdoor DetectionProactive DefenseCertified Robustness 2017.11.15 2025.05.13 Literature Database
CryptoDL: Deep Neural Networks over Encrypted Data Authors: Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi | Published: 2017-11-14 Differential PrivacyEncryption TechnologyApproximate Calculation 2017.11.14 2025.05.13 Literature Database
Machine vs Machine: Minimax-Optimal Defense Against Adversarial Examples Authors: Jihun Hamm, Akshay Mehra | Published: 2017-11-12 | Updated: 2018-06-27 Robustness ImprovementAdversarial LearningAdversarial Attack Analysis 2017.11.12 2025.05.13 Literature Database
Dynamic Analysis of Executables to Detect and Characterize Malware Authors: Michael R. Smith, Joe B. Ingram, Christopher C. Lamb, Timothy J. Draelos, Justin E. Doak, James B. Aimone, Conrad D. James | Published: 2017-11-10 | Updated: 2018-09-28 System Call AnalysisModel evaluation methodsMachine Learning Algorithm 2017.11.10 2025.05.13 Literature Database
p-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning Authors: Se Eun Oh, Saikrishna Sunkam, Nicholas Hopper | Published: 2017-11-10 | Updated: 2018-04-02 Multi-Class ClassificationPerformance EvaluationFeature Extraction Method 2017.11.10 2025.05.13 Literature Database
LatentPoison – Adversarial Attacks On The Latent Space Authors: Antonia Creswell, Anil A. Bharath, Biswa Sengupta | Published: 2017-11-08 PoisoningCertified RobustnessAdversarial attack 2017.11.08 2025.05.13 Literature Database
Intriguing Properties of Adversarial Examples Authors: Ekin D. Cubuk, Barret Zoph, Samuel S. Schoenholz, Quoc V. Le | Published: 2017-11-08 Adversarial ExampleAdversarial LearningAdversarial attack 2017.11.08 2025.05.13 Literature Database
Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques Authors: Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Jill Slay | Published: 2017-11-08 Network ForensicsBotnet Detection MethodMachine Learning Application 2017.11.08 2025.05.13 Literature Database
Contaminant Removal for Android Malware Detection Systems Authors: Lichao Sun, Xiaokai Wei, Jiawei Zhang, Lifang He, Philip S. Yu, Witawas Srisa-an | Published: 2017-11-07 | Updated: 2017-11-14 Dataset GenerationMalware Detection MethodRandom Forest 2017.11.07 2025.05.13 Literature Database
Advanced Analytics for Connected Cars Cyber Security Authors: Matan Levi, Yair Allouche, Aryeh Kontorovich | Published: 2017-11-06 | Updated: 2017-11-08 HMM Model GenerationML-Based IDSDiscussion on Protocol Vulnerabilities and Attack Scenarios 2017.11.06 2025.05.13 Literature Database