Ensemble Adversarial Training: Attacks and Defenses Authors: Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel | Published: 2017-05-19 | Updated: 2020-04-26 Certified RobustnessModel Extraction AttackDeep Learning 2017.05.19 2025.05.28 Literature Database
Delving into adversarial attacks on deep policies Authors: Jernej Kos, Dawn Song | Published: 2017-05-18 Certified RobustnessRobustnessDefense Method 2017.05.18 2025.05.28 Literature Database
A lightweight MapReduce framework for secure processing with SGX Authors: Rafael Pires, Daniel Gavril, Pascal Felber, Emanuel Onica, Marcelo Pasin | Published: 2017-05-16 Data-Driven ClusteringPerformance EvaluationPrivacy-Preserving Algorithm 2017.05.16 2025.05.28 Literature Database
Distributed Statistical Machine Learning in Adversarial Settings: Byzantine Gradient Descent Authors: Yudong Chen, Lili Su, Jiaming Xu | Published: 2017-05-16 | Updated: 2017-10-23 Model Performance EvaluationRobustnessDistributed Learning 2017.05.16 2025.05.28 Literature Database
Extending Defensive Distillation Authors: Nicolas Papernot, Patrick McDaniel | Published: 2017-05-15 RobustnessAdversarial ExampleDefense Method 2017.05.15 2025.05.28 Literature Database
Musical Instrument Recognition Using Their Distinctive Characteristics in Artificial Neural Networks Authors: Babak Toghiani-Rizi, Marcus Windmark | Published: 2017-05-14 Dataset evaluationFeature Extraction MethodSpeech Enhancement Technology 2017.05.14 2025.05.28 Literature Database
PerfWeb: How to Violate Web Privacy with Hardware Performance Events Authors: Berk Gulmezoglu, Andreas Zankl, Thomas Eisenbarth, Berk Sunar | Published: 2017-05-12 Performance EvaluationModel Performance EvaluationUser Activity Analysis 2017.05.12 2025.05.28 Literature Database
Hate is not Binary: Studying Abusive Behavior of #GamerGate on Twitter Authors: Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali | Published: 2017-05-09 Spam User DetectionUser Activity AnalysisSentiment Analysis 2017.05.09 2025.05.28 Literature Database
Keeping the Bad Guys Out: Protecting and Vaccinating Deep Learning with JPEG Compression Authors: Nilaksh Das, Madhuri Shanbhogue, Shang-Tse Chen, Fred Hohman, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2017-05-08 Model RobustnessCertified RobustnessDefense Mechanism 2017.05.08 2025.05.28 Literature Database
Attacking Machine Learning models as part of a cyber kill chain Authors: Tam N. Nguyen | Published: 2017-05-01 | Updated: 2018-04-07 Security AnalysisDetection of Model Extraction AttacksAttack Detection 2017.05.01 2025.05.28 Literature Database