Models and Framework for Adversarial Attacks on Complex Adaptive Systems Authors: Vahid Behzadan, Arslan Munir | Published: 2017-09-13 Reinforcement Learning AlgorithmAttack DetectionVulnerability Analysis 2017.09.13 2025.05.13 Literature Database
EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples Authors: Pin-Yu Chen, Yash Sharma, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh | Published: 2017-09-13 | Updated: 2018-02-10 Certified RobustnessAdversarial LearningAdversarial Example 2017.09.13 2025.05.13 Literature Database
Ensemble Methods as a Defense to Adversarial Perturbations Against Deep Neural Networks Authors: Thilo Strauss, Markus Hanselmann, Andrej Junginger, Holger Ulmer | Published: 2017-09-11 | Updated: 2018-02-08 Certified RobustnessModel Performance EvaluationRobustness Improvement 2017.09.11 2025.05.13 Literature Database
A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data Authors: Abien Fred Agarap | Published: 2017-09-10 | Updated: 2019-02-07 Model Performance EvaluationAttack DetectionMachine Learning Technology 2017.09.10 2025.05.13 Literature Database
Towards Proving the Adversarial Robustness of Deep Neural Networks Authors: Guy Katz, Clark Barrett, David L. Dill, Kyle Julian, Mykel J. Kochenderfer | Published: 2017-09-08 Certified RobustnessRobustness ImprovementAdversarial Learning 2017.09.08 2025.05.13 Literature Database
Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting Authors: Samuel Yeom, Irene Giacomelli, Matt Fredrikson, Somesh Jha | Published: 2017-09-05 | Updated: 2018-05-04 Privacy AnalysisPrivacy LeakageMembership Inference 2017.09.05 2025.05.13 Literature Database
PassGAN: A Deep Learning Approach for Password Guessing Authors: Briland Hitaj, Paolo Gasti, Giuseppe Ateniese, Fernando Perez-Cruz | Published: 2017-09-01 | Updated: 2019-02-14 Password Strength EvaluationModel Performance EvaluationChallenges of Generative Models 2017.09.01 2025.05.13 Literature Database
RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release Authors: Thee Chanyaswad, Changchang Liu, Prateek Mittal | Published: 2017-08-31 | Updated: 2018-10-16 Detection of Poison Data for Backdoor AttacksPrivacy Protection MethodGenerative Model 2017.08.31 2025.05.13 Literature Database
On Security and Sparsity of Linear Classifiers for Adversarial Settings Authors: Ambra Demontis, Paolo Russu, Battista Biggio, Giorgio Fumera, Fabio Roli | Published: 2017-08-31 Membership InferenceRobustness AnalysisAttack Method 2017.08.31 2025.05.13 Literature Database
Coppersmith’s lattices and “focus groups”: an attack on small-exponent RSA Authors: Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan | Published: 2017-08-30 | Updated: 2020-12-16 Privacy Protection MethodAttack MethodMathematical Analysis 2017.08.30 2025.05.13 Literature Database