Unpaired Image-to-Image Translation using Cycle-Consistent Adversarial Networks Authors: Jun-Yan Zhu, Taesung Park, Phillip Isola, Alexei A. Efros | Published: 2017-03-30 | Updated: 2020-08-24 Data GenerationDeepfakeImage Processing 2017.03.30 2025.05.28 Literature Database
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be Authors: Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin | Published: 2017-03-28 IoT Security IssuesSecurity Analysis MethodAttack Method 2017.03.28 2025.05.28 Literature Database
Adversarial Source Identification Game with Corrupted Training Authors: Mauro Barni, Benedetta Tondi | Published: 2017-03-27 Security AnalysisStrategic GameAttack Pattern Extraction 2017.03.27 2025.05.28 Literature Database
Biologically inspired protection of deep networks from adversarial attacks Authors: Aran Nayebi, Surya Ganguli | Published: 2017-03-27 Model Design and AccuracyCertified RobustnessImprovement of Learning 2017.03.27 2025.05.28 Literature Database
Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains Authors: Tegjyot Singh Sethi, Mehmed Kantardzic | Published: 2017-03-23 Performance EvaluationAttack Pattern ExtractionAdversarial Example 2017.03.23 2025.05.28 Literature Database
PriMaL: A Privacy-Preserving Machine Learning Method for Event Detection in Distributed Sensor Networks Authors: Stefano Bennati, Catholijn M. Jonker | Published: 2017-03-21 Event IdentificationPrivacy Protection MechanismDecentralized Processing 2017.03.21 2025.05.28 Literature Database
CSI: A Hybrid Deep Model for Fake News Detection Authors: Natali Ruchansky, Sungyong Seo, Yan Liu | Published: 2017-03-20 | Updated: 2017-09-03 Data Science MethodologyModel Design and AccuracyDetection of Misinformation 2017.03.20 2025.05.28 Literature Database
Counterfactual Fairness Authors: Matt J. Kusner, Joshua R. Loftus, Chris Russell, Ricardo Silva | Published: 2017-03-20 | Updated: 2018-03-08 Creation of Fair AI ModelsImportance of Causal ModelsMeasurement of Observational Fairness 2017.03.20 2025.05.28 Literature Database
Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking Authors: Erwin Quiring, Daniel Arp, Konrad Rieck | Published: 2017-03-16 Backdoor AttackAttack Pattern ExtractionDefense Mechanism 2017.03.16 2025.05.28 Literature Database
Understanding Black-box Predictions via Influence Functions Authors: Pang Wei Koh, Percy Liang | Published: 2017-03-14 | Updated: 2020-12-29 PoisoningImprovement of LearningExplainability Evaluation 2017.03.14 2025.05.28 Literature Database